Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-37371 (GCVE-0-2024-37371)
Vulnerability from cvelistv5 – Published: 2024-06-28 00:00 – Updated: 2025-11-03 20:38- n/a
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-37371",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-09T15:31:33.769366Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T20:28:07.509Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:38:01.079Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://web.mit.edu/kerberos/www/advisories/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241108-0009/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250124-0010/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-28T22:06:30.396Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://web.mit.edu/kerberos/www/advisories/"
},
{
"url": "https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-37371",
"datePublished": "2024-06-28T00:00:00.000Z",
"dateReserved": "2024-06-06T00:00:00.000Z",
"dateUpdated": "2025-11-03T20:38:01.079Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-37371\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-06-28T23:15:11.603\",\"lastModified\":\"2025-11-03T21:16:13.997\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.\"},{\"lang\":\"es\",\"value\":\"En MIT Kerberos 5 (tambi\u00e9n conocido como krb5) anterior a 1.21.3, un atacante puede provocar lecturas de memoria no v\u00e1lidas durante el manejo de tokens de mensajes GSS al enviar tokens de mensajes con campos de longitud no v\u00e1lidos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.21.3\",\"matchCriteriaId\":\"9882067B-E1AC-4800-AB8E-541B937B498A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D69DCC-AE4D-4EA5-861C-D60951444C6C\"}]}]}],\"references\":[{\"url\":\"https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://web.mit.edu/kerberos/www/advisories/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241108-0009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250124-0010/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://web.mit.edu/kerberos/www/advisories/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://web.mit.edu/kerberos/www/advisories/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20241108-0009/\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250124-0010/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T20:38:01.079Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-37371\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-09T15:31:33.769366Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-09T15:31:40.307Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://web.mit.edu/kerberos/www/advisories/\"}, {\"url\": \"https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-06-28T22:06:30.396Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-37371\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T20:38:01.079Z\", \"dateReserved\": \"2024-06-06T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-06-28T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
NCSC-2025-0330
Vulnerability from csaf_ncscnl - Published: 2025-10-23 13:20 - Updated: 2025-10-23 13:20Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communications producten, waaronder de Unified Assurance en Cloud Native Core.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Oracle Communications producten stellen kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, wat kan leiden tot gedeeltelijke of volledige Denial-of-Service (DoS) aanvallen. Specifiek kunnen aanvallers met netwerktoegang de systemen compromitteren, wat resulteert in ongeautoriseerde toegang tot gevoelige gegevens. De CVSS-scores van deze kwetsbaarheden vari\u00ebren van 3.1 tot 9.8, wat wijst op een breed scala aan risico\u0027s, van beperkte tot ernstige impact op de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden in zijn Communications producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "general",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "general",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications producten",
"tracking": {
"current_release_date": "2025-10-23T13:20:15.363063Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0330",
"initial_release_date": "2025-10-23T13:20:15.363063Z",
"revision_history": [
{
"date": "2025-10-23T13:20:15.363063Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Oracle Communications Billing and Revenue Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Oracle Communications Calendar Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Automated Test Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core DBTier"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Slice Selection Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "Oracle Communications Converged Charging System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergent Charging Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "Oracle Communications Diameter Signaling Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE Element Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE LNP Application Processor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "Oracle Communications LSMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "Oracle Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Analytics Data Director"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Charging and Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Integrity"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "Oracle Communications Offline Mediation Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "Oracle Communications Operations Monitor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "Oracle Communications Pricing Design Center"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "Oracle Communications Service Catalog and Design"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-33"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-34"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Inventory Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-35"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Communications Broker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-36"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Operations Monitor"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent updates address vulnerabilities in NTP 4.2.8p17 and Oracle products, including CVE-2023-26555 related to malformed RT-11 dates and various security issues in Oracle Communications and Database systems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities across various Oracle, IBM, and Protobuf products could lead to Denial of Service and unauthorized access, with significant risks identified in versions of Oracle Communications, MySQL Connector/J, and IBM WebSphere.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Communications products and the libpcap library allow high-privileged attackers to cause denial of service and NULL pointer dereference issues, with CVSS scores of 4.4 for the former.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Communications Cloud Native Core Policy, and libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle MySQL, Oracle Communications, and nghttp2 products allow remote attackers to exploit confidentiality, integrity, and availability, with varying damage ratings from medium to high.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-35164",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Assurance and Apache Guacamole could allow high-privileged attackers to compromise systems and execute arbitrary code, respectively.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35164 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-35164.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-35164"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle products, including Communications and MySQL, as well as MIT Kerberos 5, allow for unauthorized access, denial of service, and other malicious activities, with CVSS scores reaching 9.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Middleware, Documaker, and Apache Commons IO components allow unauthenticated attackers to exploit denial of service risks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-50609",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Fluent Bit 3.1.9 has a vulnerability allowing remote Denial of Service attacks via a zero-length packet, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 can be exploited by high-privileged attackers for complete Denial of Service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50609 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50609.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-50609"
},
{
"cve": "CVE-2024-51504",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "description",
"text": "Recent vulnerabilities in Apache ZooKeeper and Oracle Communications Unified Assurance expose systems to authentication bypass and unauthorized access, allowing attackers to execute commands and access critical data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51504 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-51504.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-51504"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities across various Oracle products and the Netplex Json-smart library can lead to Denial of Service (DoS) due to stack exhaustion and other exploits, affecting versions 2.5.0 to 2.5.1 and specific Oracle software.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Eclipse Jetty versions 12.0.0 to 12.0.16 are vulnerable to OutOfMemoryError and denial of service attacks due to improper validation of the SETTINGS_MAX_HEADER_LIST_SIZE parameter, affecting various products including Oracle Communications EAGLE and NetApp.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-1948"
},
{
"cve": "CVE-2025-3576",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "description",
"text": "Recent vulnerabilities in krb5 and MIT Kerberos implementations allow for message spoofing via MD5 checksum weaknesses, while Oracle Communications Network Analytics Data Director is susceptible to unauthorized data manipulation through SSH access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3576 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3576.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-3576"
},
{
"cve": "CVE-2025-4373",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and glib2 involve unauthorized access risks and buffer overflow issues, affecting multiple products with varying severity levels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4373 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-4517",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6 through 3.13.5 address multiple security vulnerabilities, particularly in the tarfile module, while enhancing various functionalities and resolving issues related to memory management and IPv6 handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4517 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4517.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-4802",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "description",
"text": "Vulnerabilities in Oracle Communications Cloud Native Core and glibc allow unauthenticated access and privilege escalation, with CVSS scores of 7.8, affecting confidentiality, integrity, and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4802 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4802.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4802"
},
{
"cve": "CVE-2025-5115",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "The \u0027MadeYouReset\u0027 vulnerability in HTTP/2 affects certain Jetty versions, allowing denial of service through malformed control frames, while additional vulnerabilities exist in Oracle Communications and SAP Commerce Cloud.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5115 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5115.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5115"
},
{
"cve": "CVE-2025-5318",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle MySQL Workbench and the libssh library expose sensitive data and allow unauthorized access, with CVSS scores indicating moderate severity.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5318.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-5399",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle MySQL Server and Cluster, along with libcurl\u0027s WebSocket code, allow for various denial of service attacks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5399 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5399"
},
{
"cve": "CVE-2025-5889",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "The juliangruber brace-expansion library has a vulnerability in versions up to 4.0.0 affecting the expand function, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 are susceptible to a partial denial of service by low-privileged attackers.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5889 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5889"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "description",
"text": "Critical vulnerabilities in Oracle Communications Cloud Native Core and SQLite versions prior to 3.50.2 expose systems to severe risks, including memory corruption and integer truncation issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Green",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6965.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-7339",
"cwe": {
"id": "CWE-241",
"name": "Improper Handling of Unexpected Data Type"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing unauthorized data access, while the on-headers middleware for Node.js has a bug affecting response header modifications in versions prior to 1.1.0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7339 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7339.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7339"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and libxslt expose systems to unauthorized access and memory corruption, with significant impacts on integrity and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-7962",
"cwe": {
"id": "CWE-147",
"name": "Improper Neutralization of Input Terminators"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Console and Jakarta Mail versions 2.0.2 and 2.2 expose systems to significant risks, including unauthorized access and SMTP Injection attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7962"
},
{
"cve": "CVE-2025-8058",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Enterprise Operations Monitor and GNU C library versions 2.4 to 2.41 expose systems to potential unauthorized access, memory corruption, and denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8058 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8058"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Bouncy Castle for Java and BCPKIX FIPS have a vulnerability allowing excessive resource allocation, while Oracle Communications Cloud Native Core Certificate Management and certain NetApp products face denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8916 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8916.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "The curl update 8.14.1 addresses security vulnerabilities, including out-of-bounds reads, proxy cache poisoning, and a bug allowing insecure sites to override secure cookies, alongside a denial of service vulnerability in Oracle Communications Unified Inventory Management.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9086 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9086.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-9086"
},
{
"cve": "CVE-2025-25724",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"notes": [
{
"category": "other",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Communications Network Analytics Data Director and the libarchive component, affecting system integrity and availability, with CVSS scores indicating significant risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-25724"
},
{
"cve": "CVE-2025-27210",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Node.js versions 20.x, 22.x, and 24.x have an incomplete fix for CVE-2025-23084 affecting Windows device names and the `path.join` API, while Oracle Communications\u0027 Cloud Native Environment has a non-exploitable Security-in-Depth issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27210 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27210.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27210"
},
{
"cve": "CVE-2025-27533",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache ActiveMQ and Oracle products allow for denial of service attacks due to improper validation and excessive memory allocation, affecting various versions and configurations.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:M/U:Red",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27533 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27533"
},
{
"cve": "CVE-2025-27553",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Middleware and Apache Commons VFS expose critical data and allow unauthorized file access, with significant risks associated with their exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27553"
},
{
"cve": "CVE-2025-27587",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "description",
"text": "OpenSSL versions 3.0.0 to 3.3.2 on PowerPC are vulnerable to a Minerva attack, while Oracle Communications Cloud Native Core Certificate Management 25.1.200 has a critical data access vulnerability, and OpenSSL 3 has addressed timing side channel issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27587 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27587.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27587"
},
{
"cve": "CVE-2025-27817",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache Kafka and Oracle applications allow unauthorized access to sensitive data, with notable SSRF risks and CVSS scores of 7.5 for Oracle products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27817"
},
{
"cve": "CVE-2025-32415",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Java SE and libxml2, allowing for potential system compromise and denial of service, with CVSS scores of 7.5 for several issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32415 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32415.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-32728",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Enterprise Communications Broker, OpenSSH, and HP-UX Secure Shell daemon could lead to unauthorized data access and system compromise, with varying CVSS scores and exploitation potential.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32728"
},
{
"cve": "CVE-2025-32990",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Inventory Management and GnuTLS\u0027s certtool expose systems to denial-of-service and unauthorized data access, with significant integrity impacts and a CVSS score of 8.2 for Oracle\u0027s flaw.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32990 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32990"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "Recent updates to Apache Commons BeanUtils address multiple vulnerabilities, including arbitrary code execution risks and unauthorized access to Java enum properties, affecting versions prior to 1.11.0 and 2.0.0-M2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48734 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48734.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48734"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle WebLogic Server and Apache Commons Lang versions expose systems to denial of service risks, including an uncontrolled recursion flaw leading to StackOverflowErrors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Application Testing Suite and Apache Commons FileUpload, including DoS risks due to insufficient multipart header limits, have been identified, with CVSS scores reaching 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Recent updates for Apache Tomcat versions 9, 10, and 11 address the \u0027MadeYouReset\u0027 DoS vulnerability in HTTP/2, along with various enhancements to components like Catalina and Coyote.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent updates for libxml2 address multiple vulnerabilities, including heap use after free and type confusion, which could lead to denial of service or crashes, alongside an Oracle vulnerability allowing unauthorized data access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49796 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing denial of service, while jackson-core versions prior to 2.15.0 can cause StackoverflowError with deeply nested data, now mitigated in version 2.15.0.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52999 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53547",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "Helm v3.18.4 addresses a critical vulnerability allowing local code execution through crafted `Chart.yaml` and symlinked `Chart.lock` files during dependency updates, alongside an Oracle Communications flaw with a CVSS score of 8.6.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53547.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53547"
},
{
"cve": "CVE-2025-53643",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Operations Monitor and aiohttp could allow unauthorized access and data manipulation, with significant integrity impacts and request smuggling risks in affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53643 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53643.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53643"
},
{
"cve": "CVE-2025-53864",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle GoldenGate and Connect2id Nimbus JOSE + JWT expose systems to denial of service attacks, with CVSS scores indicating significant availability impacts due to issues with deeply nested JSON objects.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53864"
},
{
"cve": "CVE-2025-54090",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"notes": [
{
"category": "other",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Automated Test Suite and Apache HTTP Server 2.4.64 expose systems to unauthorized data access and potential denial of service, with a CVSS score of 6.3 for the Oracle issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54090 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54090.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-54090"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent updates to Netty address critical vulnerabilities, including the \u0027MadeYouReset\u0027 DDoS attack in HTTP/2, which can lead to denial of service through resource exhaustion in various affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55163 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-57803",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "ImageMagick has addressed critical vulnerabilities in its BMP encoder, including a 32-bit integer overflow leading to heap corruption and potential code execution, alongside other security enhancements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-57803 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-57803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-57803"
},
{
"cve": "CVE-2025-58057",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Multiple vulnerabilities in decompressing decoders, including `BrotliDecoder`, and components of Oracle and HPE products can lead to denial of service through excessive buffer allocation and malformed HTTP/2 frames.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-58057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-58057"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat (CVE-2025-59375) allows excessive memory allocations from crafted XML input, affecting versions prior to 2.7.2, while a Security-in-Depth issue exists in Oracle Database Server\u0027s Perl component but is not exploitable.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59375 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59375.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-59375"
}
]
}
NCSC-2025-0024
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:32 - Updated: 2025-01-22 13:32Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende in staat om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Toegang tot gevoelige gegevens\n\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2025-01-22T13:32:27.142159Z",
"id": "NCSC-2025-0024",
"initial_release_date": "2025-01-22T13:32:27.142159Z",
"revision_history": [
{
"date": "2025-01-22T13:32:27.142159Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-249429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1506681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___7.5.35",
"product": {
"name": "mysql___7.5.35",
"product_id": "CSAFPID-1674684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___7.5.35:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___7.6.31",
"product": {
"name": "mysql___7.6.31",
"product_id": "CSAFPID-1674685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___7.6.31:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.0.35",
"product": {
"name": "mysql___8.0.35",
"product_id": "CSAFPID-1617768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.0.35:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.0.38",
"product": {
"name": "mysql___8.0.38",
"product_id": "CSAFPID-1617874",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.0.38:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.0.39",
"product": {
"name": "mysql___8.0.39",
"product_id": "CSAFPID-1674686",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.0.39:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.4.1",
"product": {
"name": "mysql___8.4.1",
"product_id": "CSAFPID-1674682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.4.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.4.2",
"product": {
"name": "mysql___8.4.2",
"product_id": "CSAFPID-1674687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___9.0.0",
"product": {
"name": "mysql___9.0.0",
"product_id": "CSAFPID-1674688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___9.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___9.0.1",
"product": {
"name": "mysql___9.0.1",
"product_id": "CSAFPID-1674683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___9.0.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1751129",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1673433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1751130",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1673432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1751131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1673434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1751132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connector\\/python",
"product": {
"name": "mysql_connector\\/python",
"product_id": "CSAFPID-1751151",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connector\\/python:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1751221",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.0.40_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1751219",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.4.3_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1751220",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_firewall",
"product": {
"name": "mysql_enterprise_firewall",
"product_id": "CSAFPID-1751124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:8.0.40_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_firewall",
"product": {
"name": "mysql_enterprise_firewall",
"product_id": "CSAFPID-1751125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:8.4.3_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_firewall",
"product": {
"name": "mysql_enterprise_firewall",
"product_id": "CSAFPID-1751126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1650794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1673429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1751119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1673179",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1673428",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1751120",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1673430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1751121",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-37519",
"product_status": {
"known_affected": [
"CSAFPID-1673428",
"CSAFPID-1751119"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-37519",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37519.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673428",
"CSAFPID-1751119"
]
}
],
"title": "CVE-2021-37519"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751219",
"CSAFPID-1751119",
"CSAFPID-1751220",
"CSAFPID-1751121",
"CSAFPID-1751120",
"CSAFPID-1751221",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751219",
"CSAFPID-1751119",
"CSAFPID-1751220",
"CSAFPID-1751121",
"CSAFPID-1751120",
"CSAFPID-1751221",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673432",
"CSAFPID-1673433",
"CSAFPID-1673434",
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673432",
"CSAFPID-1673433",
"CSAFPID-1673434",
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673432",
"CSAFPID-1673433",
"CSAFPID-1673434",
"CSAFPID-1506681",
"CSAFPID-1674682",
"CSAFPID-1674683",
"CSAFPID-1674684",
"CSAFPID-1674685",
"CSAFPID-1617768",
"CSAFPID-1674686",
"CSAFPID-1674687",
"CSAFPID-1674688",
"CSAFPID-1617874",
"CSAFPID-249429",
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673432",
"CSAFPID-1673433",
"CSAFPID-1673434",
"CSAFPID-1506681",
"CSAFPID-1674682",
"CSAFPID-1674683",
"CSAFPID-1674684",
"CSAFPID-1674685",
"CSAFPID-1617768",
"CSAFPID-1674686",
"CSAFPID-1674687",
"CSAFPID-1674688",
"CSAFPID-1617874",
"CSAFPID-249429",
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2025-21490",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21490"
},
{
"cve": "CVE-2025-21491",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21491"
},
{
"cve": "CVE-2025-21492",
"product_status": {
"known_affected": [
"CSAFPID-1650794",
"CSAFPID-1673179",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650794",
"CSAFPID-1673179",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21492"
},
{
"cve": "CVE-2025-21493",
"product_status": {
"known_affected": [
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21493",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21493.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21493"
},
{
"cve": "CVE-2025-21494",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21494",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21494.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21494"
},
{
"cve": "CVE-2025-21495",
"product_status": {
"known_affected": [
"CSAFPID-1751124",
"CSAFPID-1751125",
"CSAFPID-1751126",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21495",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21495.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751124",
"CSAFPID-1751125",
"CSAFPID-1751126",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21495"
},
{
"cve": "CVE-2025-21497",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21497",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21497.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21497"
},
{
"cve": "CVE-2025-21499",
"product_status": {
"known_affected": [
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21499",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21499.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21499"
},
{
"cve": "CVE-2025-21500",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21500",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21500.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21500"
},
{
"cve": "CVE-2025-21501",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21501",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21501.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21501"
},
{
"cve": "CVE-2025-21503",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21503",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21503.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21503"
},
{
"cve": "CVE-2025-21504",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21504",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21504.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21504"
},
{
"cve": "CVE-2025-21505",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21505",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21505.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21505"
},
{
"cve": "CVE-2025-21518",
"product_status": {
"known_affected": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21518",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21518.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21518"
},
{
"cve": "CVE-2025-21519",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21519",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21519.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21519"
},
{
"cve": "CVE-2025-21520",
"product_status": {
"known_affected": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21520",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21520.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 1.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21520"
},
{
"cve": "CVE-2025-21521",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21521",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21521.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21521"
},
{
"cve": "CVE-2025-21522",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21522",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21522.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21522"
},
{
"cve": "CVE-2025-21523",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21523",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21523.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21523"
},
{
"cve": "CVE-2025-21525",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21525",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21525.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21525"
},
{
"cve": "CVE-2025-21529",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21529",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21529.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21529"
},
{
"cve": "CVE-2025-21531",
"product_status": {
"known_affected": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21531",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21531.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21531"
},
{
"cve": "CVE-2025-21534",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21534",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21534.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21534"
},
{
"cve": "CVE-2025-21536",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21536",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21536.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21536"
},
{
"cve": "CVE-2025-21540",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21540",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21540.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21540"
},
{
"cve": "CVE-2025-21543",
"product_status": {
"known_affected": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21543",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21543.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21543"
},
{
"cve": "CVE-2025-21546",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21546",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21546.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21546"
},
{
"cve": "CVE-2025-21548",
"product_status": {
"known_affected": [
"CSAFPID-1751151",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21548",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21548.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751151",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21548"
},
{
"cve": "CVE-2025-21555",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21555"
},
{
"cve": "CVE-2025-21559",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21559"
},
{
"cve": "CVE-2025-21566",
"product_status": {
"known_affected": [
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21566",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21566.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21566"
},
{
"cve": "CVE-2025-21567",
"product_status": {
"known_affected": [
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21567",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21567.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21567"
}
]
}
NCSC-2024-0420
Vulnerability from csaf_ncscnl - Published: 2024-10-17 13:20 - Updated: 2024-10-17 13:20Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2024-10-17T13:20:42.437738Z",
"id": "NCSC-2024-0420",
"initial_release_date": "2024-10-17T13:20:42.437738Z",
"revision_history": [
{
"date": "2024-10-17T13:20:42.437738Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-764289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-221160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-249429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1673522",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-764290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-504250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-764763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_client",
"product": {
"name": "mysql_client",
"product_id": "CSAFPID-1673440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45853",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45853",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45853.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-45853"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673522"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673522"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673522"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673522"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-21193",
"references": [
{
"category": "self",
"summary": "CVE-2024-21193",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21193.json"
}
],
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"references": [
{
"category": "self",
"summary": "CVE-2024-21194",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21194.json"
}
],
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21196.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21197",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21197.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21198",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21198.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21199",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21199.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21203",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21203.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"references": [
{
"category": "self",
"summary": "CVE-2024-21204",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21204.json"
}
],
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21207.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"product_status": {
"known_affected": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21209",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21209.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.0,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21212.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21213",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21213.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21231",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21231.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21236.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21239",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21239.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21241",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21241.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21243",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21244.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"product_status": {
"known_affected": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21247",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21247.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"references": [
{
"category": "self",
"summary": "CVE-2024-21262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21262.json"
}
],
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"references": [
{
"category": "self",
"summary": "CVE-2024-21272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21272.json"
}
],
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-39689",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39689",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
}
],
"title": "CVE-2024-39689"
}
]
}
NCSC-2024-0414
Vulnerability from csaf_ncscnl - Published: 2024-10-17 13:17 - Updated: 2024-10-17 13:17Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van gegevens\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Signed to Unsigned Conversion Error",
"title": "CWE-195"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2024-10-17T13:17:52.103171Z",
"id": "NCSC-2024-0414",
"initial_release_date": "2024-10-17T13:17:52.103171Z",
"revision_history": [
{
"date": "2024-10-17T13:17:52.103171Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-204629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-1673475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1650734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-204639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-204627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
"product": {
"name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
"product_id": "CSAFPID-219835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management__-_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3.0.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-41194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-765241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-498607",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12:0.0.5.0:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_calendar_server",
"product": {
"name": "communications_calendar_server",
"product_id": "CSAFPID-764736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_calendar_server",
"product": {
"name": "communications_calendar_server",
"product_id": "CSAFPID-220190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_configuration_console",
"product": {
"name": "communications_cloud_native_configuration_console",
"product_id": "CSAFPID-391501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_configuration_console",
"product": {
"name": "communications_cloud_native_configuration_console",
"product_id": "CSAFPID-440102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-89545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-180215",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-180197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-41516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-41515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220057",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-2045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-40612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-608629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-93784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-41111",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-493445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-294401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-220547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-220459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611403",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-912066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1503323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-165550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-93546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-180195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-40299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-187447",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-45186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-45185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-220559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-220558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-764238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-764239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-764825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:22.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-180201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-760687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-40947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-93635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-503534",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-90018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-220327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-94290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-220325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-614513",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-643776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40613",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-2044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40301",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-180194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-449747",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-223527",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-449746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-503493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-260394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-618156",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1673473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0-24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-40611",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-40609",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-180198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-41112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-41110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-760688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-493444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-93633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220056",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-223511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-216017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220918",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614514",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-40608",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-180199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-41113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-260395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-260393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-220468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-2310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-93547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-180200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-180193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-93636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-90020",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-90015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-220133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-765371",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:all_supported_s:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-180216",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-180202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-40300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-93653",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-40949",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-642000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-93634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-90021",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-218028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-611401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-40610",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-611587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-642002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-493443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-642001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-180217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-180196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-165576",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-40297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-589926",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-179780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-40948",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-589925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-179779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90019",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-220326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-764737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-224787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-220189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-764827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:7.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-764828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server_-_service_controller",
"product": {
"name": "communications_converged_application_server_-_service_controller",
"product_id": "CSAFPID-764734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server_-_service_controller",
"product": {
"name": "communications_converged_application_server_-_service_controller",
"product_id": "CSAFPID-426842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-345031",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-204635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-764833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-764248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-110244",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-110242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-93777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-93772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_data_model",
"product": {
"name": "communications_data_model",
"product_id": "CSAFPID-764902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_data_model:12.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-765372",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-342799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-165544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704410",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-41183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_intelligence_hub",
"product": {
"name": "communications_diameter_intelligence_hub",
"product_id": "CSAFPID-342802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_intelligence_hub",
"product": {
"name": "communications_diameter_intelligence_hub",
"product_id": "CSAFPID-764829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1892",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1885",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1650826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1650830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_application_processor",
"product": {
"name": "communications_eagle_application_processor",
"product_id": "CSAFPID-1673417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_application_processor",
"product": {
"name": "communications_eagle_application_processor",
"product_id": "CSAFPID-765369",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:all_supported_s:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-204528",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_ftp_table_base_retrieval",
"product": {
"name": "communications_eagle_ftp_table_base_retrieval",
"product_id": "CSAFPID-204623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_lnp_application_processor",
"product": {
"name": "communications_eagle_lnp_application_processor",
"product_id": "CSAFPID-352633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_lnp_application_processor",
"product": {
"name": "communications_eagle_lnp_application_processor",
"product_id": "CSAFPID-352632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_software",
"product": {
"name": "communications_eagle_software",
"product_id": "CSAFPID-765366",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_software",
"product": {
"name": "communications_eagle_software",
"product_id": "CSAFPID-765365",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_software:46.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_elastic_charging_engine",
"product": {
"name": "communications_elastic_charging_engine",
"product_id": "CSAFPID-764834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-9226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-9070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-8845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-2286",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-345038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-93629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-611422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-93630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_evolved_communications_application_server",
"product": {
"name": "communications_evolved_communications_application_server",
"product_id": "CSAFPID-204645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-207586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-234306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-387664",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_interactive_session_recorder",
"product": {
"name": "communications_interactive_session_recorder",
"product_id": "CSAFPID-1893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_lsms",
"product": {
"name": "communications_lsms",
"product_id": "CSAFPID-1673065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_lsms:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-764835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.20.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-375182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.21.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-41182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-226017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-220167",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-764243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-764249",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-220125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-245244",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-204554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-9489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-110249",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-219898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-179774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center",
"product": {
"name": "communications_performance_intelligence_center",
"product_id": "CSAFPID-1673485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center:prior_to_10.4.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-765367",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-765368",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-764830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-573035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-45192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-611406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-204595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-204590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_services_gatekeeper",
"product": {
"name": "communications_services_gatekeeper",
"product_id": "CSAFPID-608630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-704413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-166028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2288",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2282",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2285",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2279",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-204634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-345039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-93628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-611423",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-93631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-342805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-704414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-166027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2287",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2283",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2284",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2280",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-220414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-204607",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_router",
"product": {
"name": "communications_session_router",
"product_id": "CSAFPID-764780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_router",
"product": {
"name": "communications_session_router",
"product_id": "CSAFPID-764781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_router:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_subscriber-aware_load_balancer",
"product": {
"name": "communications_subscriber-aware_load_balancer",
"product_id": "CSAFPID-93775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_subscriber-aware_load_balancer",
"product": {
"name": "communications_subscriber-aware_load_balancer",
"product_id": "CSAFPID-93774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-764901",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-614089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204614",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_session_manager",
"product": {
"name": "communications_unified_session_manager",
"product_id": "CSAFPID-110243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_session_manager",
"product": {
"name": "communications_unified_session_manager",
"product_id": "CSAFPID-205759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-764900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-76994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-568240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-764782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-355340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-611408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-703515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-611407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-204456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-37137",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-41182",
"CSAFPID-209546",
"CSAFPID-40608",
"CSAFPID-180216",
"CSAFPID-93547",
"CSAFPID-180217",
"CSAFPID-2310",
"CSAFPID-40612",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-1899",
"CSAFPID-41111",
"CSAFPID-40299",
"CSAFPID-187447",
"CSAFPID-1900",
"CSAFPID-40301",
"CSAFPID-180194",
"CSAFPID-40298",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-40300",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-40294",
"CSAFPID-110243",
"CSAFPID-204629",
"CSAFPID-765241",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-41183",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-1893",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-204456",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-204645",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180196",
"CSAFPID-180201",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-764739",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204635",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673381",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-37137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-41182",
"CSAFPID-209546",
"CSAFPID-40608",
"CSAFPID-180216",
"CSAFPID-93547",
"CSAFPID-180217",
"CSAFPID-2310",
"CSAFPID-40612",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-1899",
"CSAFPID-41111",
"CSAFPID-40299",
"CSAFPID-187447",
"CSAFPID-1900",
"CSAFPID-40301",
"CSAFPID-180194",
"CSAFPID-40298",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-40300",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-40294",
"CSAFPID-110243",
"CSAFPID-204629",
"CSAFPID-765241",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-41183",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-1893",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-204456",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-204645",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180196",
"CSAFPID-180201",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-764739",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204635",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673381",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2022-2068",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40949",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-764735",
"CSAFPID-204635",
"CSAFPID-41183",
"CSAFPID-234306",
"CSAFPID-41182",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-764738",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-220547",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-93636",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2068.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-40949",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-764735",
"CSAFPID-204635",
"CSAFPID-41183",
"CSAFPID-234306",
"CSAFPID-41182",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-764738",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-220547",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-93636",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2601",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-23437",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-204629",
"CSAFPID-704410",
"CSAFPID-704411",
"CSAFPID-704412",
"CSAFPID-226017",
"CSAFPID-179774",
"CSAFPID-219898",
"CSAFPID-219826",
"CSAFPID-204569",
"CSAFPID-204510",
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-220548",
"CSAFPID-608629",
"CSAFPID-93784",
"CSAFPID-41111",
"CSAFPID-1685",
"CSAFPID-493445",
"CSAFPID-294401",
"CSAFPID-220547",
"CSAFPID-764824",
"CSAFPID-220459",
"CSAFPID-764825",
"CSAFPID-93635",
"CSAFPID-503534",
"CSAFPID-503493",
"CSAFPID-493444",
"CSAFPID-93633",
"CSAFPID-260395",
"CSAFPID-260393",
"CSAFPID-220468",
"CSAFPID-93636",
"CSAFPID-93634",
"CSAFPID-589926",
"CSAFPID-179780",
"CSAFPID-589925",
"CSAFPID-179779",
"CSAFPID-764826",
"CSAFPID-764827",
"CSAFPID-764828",
"CSAFPID-764829",
"CSAFPID-764830",
"CSAFPID-220190",
"CSAFPID-220189",
"CSAFPID-764833",
"CSAFPID-41183",
"CSAFPID-764834",
"CSAFPID-234306",
"CSAFPID-764835",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-40949",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-204635",
"CSAFPID-41182",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-1899",
"CSAFPID-40299",
"CSAFPID-1900",
"CSAFPID-180194",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-110243",
"CSAFPID-765241",
"CSAFPID-209546",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180217",
"CSAFPID-180196",
"CSAFPID-40612",
"CSAFPID-180201",
"CSAFPID-180216",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-40608",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-2310",
"CSAFPID-93547",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673065",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23437",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-23437.json"
}
],
"title": "CVE-2022-23437"
},
{
"cve": "CVE-2022-36760",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-704412",
"CSAFPID-704411",
"CSAFPID-704410",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-704412",
"CSAFPID-704411",
"CSAFPID-704410",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2023-2953",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2953",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2953.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-2953"
},
{
"cve": "CVE-2023-3635",
"cwe": {
"id": "CWE-195",
"name": "Signed to Unsigned Conversion Error"
},
"notes": [
{
"category": "other",
"text": "Signed to Unsigned Conversion Error",
"title": "CWE-195"
},
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-204622",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-219909",
"CSAFPID-220558",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611401",
"CSAFPID-611406",
"CSAFPID-611407",
"CSAFPID-611408",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-614513",
"CSAFPID-614514",
"CSAFPID-614515",
"CSAFPID-614516",
"CSAFPID-614517",
"CSAFPID-618156",
"CSAFPID-643776",
"CSAFPID-764237",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-764240",
"CSAFPID-764241",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-764249",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3635",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3635.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-204622",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-219909",
"CSAFPID-220558",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611401",
"CSAFPID-611406",
"CSAFPID-611407",
"CSAFPID-611408",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-614513",
"CSAFPID-614514",
"CSAFPID-614515",
"CSAFPID-614516",
"CSAFPID-614517",
"CSAFPID-618156",
"CSAFPID-643776",
"CSAFPID-764237",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-764240",
"CSAFPID-764241",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-764249",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242"
]
}
],
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816352",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-342804",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-224793",
"CSAFPID-816794",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342803",
"CSAFPID-611595",
"CSAFPID-764738",
"CSAFPID-816351",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-912073",
"CSAFPID-912558"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816352",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-342804",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-224793",
"CSAFPID-816794",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342803",
"CSAFPID-611595",
"CSAFPID-764738",
"CSAFPID-816351",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-912073",
"CSAFPID-912558"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-5685",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5685",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2023-38408",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-45182",
"CSAFPID-40293",
"CSAFPID-611406",
"CSAFPID-764237",
"CSAFPID-220558",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-614513",
"CSAFPID-643776",
"CSAFPID-611387",
"CSAFPID-618156",
"CSAFPID-614516",
"CSAFPID-614515",
"CSAFPID-614514",
"CSAFPID-764240",
"CSAFPID-94291",
"CSAFPID-611401",
"CSAFPID-614517",
"CSAFPID-764241",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-342804",
"CSAFPID-611408",
"CSAFPID-611407",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-611595",
"CSAFPID-764249",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-45182",
"CSAFPID-40293",
"CSAFPID-611406",
"CSAFPID-764237",
"CSAFPID-220558",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-614513",
"CSAFPID-643776",
"CSAFPID-611387",
"CSAFPID-618156",
"CSAFPID-614516",
"CSAFPID-614515",
"CSAFPID-614514",
"CSAFPID-764240",
"CSAFPID-94291",
"CSAFPID-611401",
"CSAFPID-614517",
"CSAFPID-764241",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-342804",
"CSAFPID-611408",
"CSAFPID-611407",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-611595",
"CSAFPID-764249",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-43642",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673395",
"CSAFPID-94291",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-43642",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43642.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673395",
"CSAFPID-94291",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797"
]
}
],
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-46136",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673411",
"CSAFPID-912549",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-220132",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46136.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673411",
"CSAFPID-912549",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-220132",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-46136"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816352",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-219803",
"CSAFPID-816351",
"CSAFPID-611595",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673417",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-90016",
"CSAFPID-764826",
"CSAFPID-345038",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-93781",
"CSAFPID-345039",
"CSAFPID-912080",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-611413",
"CSAFPID-240600",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816352",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-219803",
"CSAFPID-816351",
"CSAFPID-611595",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673417",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-90016",
"CSAFPID-764826",
"CSAFPID-345038",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-93781",
"CSAFPID-345039",
"CSAFPID-912080",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-611413",
"CSAFPID-240600",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51775",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2023-52428",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912102",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912102",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650731",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650731",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-5971",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673526",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5971",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5971.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673526",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-5971"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6387",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503595",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json"
}
],
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-912101",
"CSAFPID-1673473",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912101",
"CSAFPID-1673473",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673475",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-224795",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673475",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-224795",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-22257",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650820",
"CSAFPID-1650751",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650820",
"CSAFPID-1650751",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-23672",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23672",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-23672"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650734",
"CSAFPID-1650830",
"CSAFPID-1650777",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-1650778",
"CSAFPID-41182",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650734",
"CSAFPID-1650830",
"CSAFPID-1650777",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-1650778",
"CSAFPID-41182",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-24549",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1650752",
"CSAFPID-1673481",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1650752",
"CSAFPID-1673481",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1673485",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673389",
"CSAFPID-1672767",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673415",
"CSAFPID-1673390",
"CSAFPID-1673413",
"CSAFPID-1673395",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1673485",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673389",
"CSAFPID-1672767",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673415",
"CSAFPID-1673390",
"CSAFPID-1673413",
"CSAFPID-1673395",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-29736",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-29736"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673413",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29857",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673413",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-30251",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-30251"
},
{
"cve": "CVE-2024-31080",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31080.json"
}
],
"title": "CVE-2024-31080"
},
{
"cve": "CVE-2024-31744",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31744",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31744.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-31744"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-39689",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39689",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-39689"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673516",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673516",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1674625"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1674625"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-43044",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673494",
"CSAFPID-1673393",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673494",
"CSAFPID-1673393",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-45492"
}
]
}
NCSC-2025-0187
Vulnerability from csaf_ncscnl - Published: 2025-06-10 13:11 - Updated: 2025-06-10 13:11Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als RUGGEDCOM, SCALANCE, SIMATIC en Tecnomatix",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Use of NullPointerException Catch to Detect NULL Pointer Dereference",
"title": "CWE-395"
},
{
"category": "general",
"text": "Insufficient Entropy in PRNG",
"title": "CWE-332"
},
{
"category": "general",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Premature Release of Resource During Expected Lifetime",
"title": "CWE-826"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "general",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
},
{
"category": "general",
"text": "Improper Update of Reference Count",
"title": "CWE-911"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "general",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Privilege Chaining",
"title": "CWE-268"
},
{
"category": "general",
"text": "Race Condition within a Thread",
"title": "CWE-366"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)",
"title": "CWE-99"
},
{
"category": "general",
"text": "Improper Initialization",
"title": "CWE-665"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "External Control of File Name or Path",
"title": "CWE-73"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-082556.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-345750.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-486186.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-513708.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-633269.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-693776.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-06-10T13:11:56.672768Z",
"generator": {
"date": "2025-06-05T14:45:00Z",
"engine": {
"name": "V.A.",
"version": "1.1"
}
},
"id": "NCSC-2025-0187",
"initial_release_date": "2025-06-10T13:11:56.672768Z",
"revision_history": [
{
"date": "2025-06-10T13:11:56.672768Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1211853"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/3.1.0",
"product": {
"name": "vers:siemens/3.1.0",
"product_id": "CSAFPID-1195553"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0",
"product": {
"name": "vers:unknown/1.0",
"product_id": "CSAFPID-1211202"
}
}
],
"category": "product_name",
"name": "Simatic S7-1500 Tm Mfp Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/7.4.3",
"product": {
"name": "vers:siemens/7.4.3",
"product_id": "CSAFPID-2849543"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1756091"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619544"
}
}
],
"category": "product_name",
"name": "Ruggedcom Ape1808"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/3.0.0",
"product": {
"name": "vers:siemens/3.0.0",
"product_id": "CSAFPID-2082475"
}
}
],
"category": "product_name",
"name": "Scalance W700 Ieee 802.11Ax Firmware"
}
],
"category": "product_family",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003e=v3.1.0",
"product": {
"name": "vers:all/\u003e=v3.1.0",
"product_id": "CSAFPID-1266669"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003e=v3.1.0",
"product": {
"name": "vers:all/\u003e=v3.1.0",
"product_id": "CSAFPID-1266670"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003e=v3.1.0",
"product": {
"name": "vers:all/\u003e=v3.1.0",
"product_id": "CSAFPID-1266671"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003e=v3.1.0",
"product": {
"name": "vers:all/\u003e=v3.1.0",
"product_id": "CSAFPID-1266672"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-2460438"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.3.0",
"product": {
"name": "vers:unknown/\u003cv1.3.0",
"product_id": "CSAFPID-1270701"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP - BIOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.1",
"product": {
"name": "vers:unknown/\u003cv1.1",
"product_id": "CSAFPID-1270700"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003e=v3.1.0",
"product": {
"name": "vers:all/\u003e=v3.1.0",
"product_id": "CSAFPID-1266673"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1272525"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-126262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "ruggedcom_ape1808"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-2905706"
}
}
],
"category": "product_name",
"name": "Energy Services"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv2404.0013",
"product": {
"name": "vers:all/\u003cv2404.0013",
"product_id": "CSAFPID-2905742"
}
}
],
"category": "product_name",
"name": "Tecnomatix Plant Simulation V2404"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905748"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905793"
}
}
],
"category": "product_name",
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905749"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905794"
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905750"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905795"
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905751"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905796"
}
}
],
"category": "product_name",
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905752"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905797"
}
}
],
"category": "product_name",
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905753"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905798"
}
}
],
"category": "product_name",
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905754"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905799"
}
}
],
"category": "product_name",
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905755"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905800"
}
}
],
"category": "product_name",
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905756"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905801"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905757"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905802"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905758"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905803"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905759"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905804"
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905760"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905805"
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905761"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905806"
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905762"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905807"
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905763"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905808"
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905764"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905809"
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905765"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905810"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905766"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905811"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905767"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905812"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905768"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905813"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905769"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905814"
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905770"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905815"
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905771"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905816"
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905772"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905817"
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905773"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905818"
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905774"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905819"
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905775"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905820"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905776"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905821"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905777"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905822"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905778"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905823"
}
}
],
"category": "product_name",
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905786"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905831"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905785"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905830"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905787"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905832"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905783"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905828"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905782"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905827"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905784"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905829"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905780"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905825"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905779"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905824"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.1",
"product": {
"name": "vers:all/\u003cv3.1",
"product_id": "CSAFPID-2905781"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.2",
"product": {
"name": "vers:all/\u003cv3.2",
"product_id": "CSAFPID-2905826"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-41617",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-41617 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-41617.json"
}
],
"title": "CVE-2021-41617"
},
{
"cve": "CVE-2023-4527",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4527 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4527.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-4527"
},
{
"cve": "CVE-2023-4806",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4806 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4806.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-4806"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4911 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4911.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5363 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-5363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-6246",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6246 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6246.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-6246"
},
{
"cve": "CVE-2023-6779",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6779 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6779.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-6779"
},
{
"cve": "CVE-2023-6780",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6780 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6780.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-6780"
},
{
"cve": "CVE-2023-28531",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28531 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-28531.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-28531"
},
{
"cve": "CVE-2023-38545",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38545 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-38545.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-38545"
},
{
"cve": "CVE-2023-38546",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "other",
"text": "External Control of File Name or Path",
"title": "CWE-73"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38546 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-38546.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-38546"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:L/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52927",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52927 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-52927.json"
}
],
"title": "CVE-2023-52927"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6387",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6387 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6387.json"
}
],
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-12243",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12243 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12243.json"
}
],
"title": "CVE-2024-12243"
},
{
"cve": "CVE-2024-24855",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24855 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-24855.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-24855"
},
{
"cve": "CVE-2024-26596",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26596 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-26596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-26596"
},
{
"cve": "CVE-2024-28085",
"cwe": {
"id": "CWE-268",
"name": "Privilege Chaining"
},
"notes": [
{
"category": "other",
"text": "Privilege Chaining",
"title": "CWE-268"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28085 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33599 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33599.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33600 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33600.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33601 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "other",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34397 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-34397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-34397"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-41797",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41797 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-41797.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-41797"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-50246",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50246 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50246.json"
}
],
"title": "CVE-2024-50246"
},
{
"cve": "CVE-2024-53166",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53166 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-53166.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-57977",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57977 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57977.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-57977"
},
{
"cve": "CVE-2024-57996",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57996 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57996.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-57996"
},
{
"cve": "CVE-2024-58005",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)",
"title": "CWE-99"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-58005 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-58005.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2024-58005"
},
{
"cve": "CVE-2025-0133",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-0133"
},
{
"cve": "CVE-2025-4373",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4373 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json"
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-4598",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4598 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4598.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-4598"
},
{
"cve": "CVE-2025-21701",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21701 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21701.json"
}
],
"title": "CVE-2025-21701"
},
{
"cve": "CVE-2025-21702",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21702 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21702.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-21702"
},
{
"cve": "CVE-2025-21712",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21712 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21712.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-21712"
},
{
"cve": "CVE-2025-21724",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-21724"
},
{
"cve": "CVE-2025-21728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21728.json"
}
],
"title": "CVE-2025-21728"
},
{
"cve": "CVE-2025-21745",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"notes": [
{
"category": "other",
"text": "Improper Update of Reference Count",
"title": "CWE-911"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21745 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21745.json"
}
],
"title": "CVE-2025-21745"
},
{
"cve": "CVE-2025-21756",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21756 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21756.json"
}
],
"title": "CVE-2025-21756"
},
{
"cve": "CVE-2025-21758",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21758 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21758.json"
}
],
"title": "CVE-2025-21758"
},
{
"cve": "CVE-2025-21765",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21765 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21765.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-21765"
},
{
"cve": "CVE-2025-21766",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21766 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-21766"
},
{
"cve": "CVE-2025-21767",
"cwe": {
"id": "CWE-332",
"name": "Insufficient Entropy in PRNG"
},
"notes": [
{
"category": "other",
"text": "Insufficient Entropy in PRNG",
"title": "CWE-332"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21767 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-21767"
},
{
"cve": "CVE-2025-21795",
"cwe": {
"id": "CWE-371",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21795.json"
}
],
"title": "CVE-2025-21795"
},
{
"cve": "CVE-2025-21796",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21796 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21796.json"
}
],
"title": "CVE-2025-21796"
},
{
"cve": "CVE-2025-21848",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Use of NullPointerException Catch to Detect NULL Pointer Dereference",
"title": "CWE-395"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21848 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21848.json"
}
],
"title": "CVE-2025-21848"
},
{
"cve": "CVE-2025-21862",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "other",
"text": "Improper Initialization",
"title": "CWE-665"
},
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21862 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21862.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-21862"
},
{
"cve": "CVE-2025-21864",
"cwe": {
"id": "CWE-371",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21864.json"
}
],
"title": "CVE-2025-21864"
},
{
"cve": "CVE-2025-21865",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21865 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21865.json"
}
],
"title": "CVE-2025-21865"
},
{
"cve": "CVE-2025-26465",
"cwe": {
"id": "CWE-310",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26465 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-26465"
},
{
"cve": "CVE-2025-31115",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"notes": [
{
"category": "other",
"text": "Race Condition within a Thread",
"title": "CWE-366"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Premature Release of Resource During Expected Lifetime",
"title": "CWE-826"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31115 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31115.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-31115"
},
{
"cve": "CVE-2025-32454",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-32454"
},
{
"cve": "CVE-2025-40567",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40567 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40567.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-40567"
},
{
"cve": "CVE-2025-40568",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40568 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40568.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-40568"
},
{
"cve": "CVE-2025-40569",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40569 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40569.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-40569"
},
{
"cve": "CVE-2025-40585",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40585 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-40585"
},
{
"cve": "CVE-2025-46836",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46836 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46836.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211853",
"CSAFPID-1266669",
"CSAFPID-1266670",
"CSAFPID-1195553",
"CSAFPID-1266671",
"CSAFPID-1266672",
"CSAFPID-2460438",
"CSAFPID-1270701",
"CSAFPID-1270700",
"CSAFPID-1266673",
"CSAFPID-1211202",
"CSAFPID-1272525",
"CSAFPID-2849543",
"CSAFPID-1756091",
"CSAFPID-2619544",
"CSAFPID-126262",
"CSAFPID-2082475",
"CSAFPID-2905706",
"CSAFPID-2905742",
"CSAFPID-2905748",
"CSAFPID-2905793",
"CSAFPID-2905749",
"CSAFPID-2905794",
"CSAFPID-2905750",
"CSAFPID-2905795",
"CSAFPID-2905751",
"CSAFPID-2905796",
"CSAFPID-2905752",
"CSAFPID-2905797",
"CSAFPID-2905753",
"CSAFPID-2905798",
"CSAFPID-2905754",
"CSAFPID-2905799",
"CSAFPID-2905755",
"CSAFPID-2905800",
"CSAFPID-2905756",
"CSAFPID-2905801",
"CSAFPID-2905757",
"CSAFPID-2905802",
"CSAFPID-2905758",
"CSAFPID-2905803",
"CSAFPID-2905759",
"CSAFPID-2905804",
"CSAFPID-2905760",
"CSAFPID-2905805",
"CSAFPID-2905761",
"CSAFPID-2905806",
"CSAFPID-2905762",
"CSAFPID-2905807",
"CSAFPID-2905763",
"CSAFPID-2905808",
"CSAFPID-2905764",
"CSAFPID-2905809",
"CSAFPID-2905765",
"CSAFPID-2905810",
"CSAFPID-2905766",
"CSAFPID-2905811",
"CSAFPID-2905767",
"CSAFPID-2905812",
"CSAFPID-2905768",
"CSAFPID-2905813",
"CSAFPID-2905769",
"CSAFPID-2905814",
"CSAFPID-2905770",
"CSAFPID-2905815",
"CSAFPID-2905771",
"CSAFPID-2905816",
"CSAFPID-2905772",
"CSAFPID-2905817",
"CSAFPID-2905773",
"CSAFPID-2905818",
"CSAFPID-2905774",
"CSAFPID-2905819",
"CSAFPID-2905775",
"CSAFPID-2905820",
"CSAFPID-2905776",
"CSAFPID-2905821",
"CSAFPID-2905777",
"CSAFPID-2905822",
"CSAFPID-2905778",
"CSAFPID-2905823",
"CSAFPID-2905786",
"CSAFPID-2905831",
"CSAFPID-2905785",
"CSAFPID-2905830",
"CSAFPID-2905787",
"CSAFPID-2905832",
"CSAFPID-2905783",
"CSAFPID-2905828",
"CSAFPID-2905782",
"CSAFPID-2905827",
"CSAFPID-2905784",
"CSAFPID-2905829",
"CSAFPID-2905780",
"CSAFPID-2905825",
"CSAFPID-2905779",
"CSAFPID-2905824",
"CSAFPID-2905781",
"CSAFPID-2905826"
]
}
],
"title": "CVE-2025-46836"
}
]
}
NCSC-2024-0411
Vulnerability from csaf_ncscnl - Published: 2024-10-17 13:15 - Updated: 2024-10-17 13:15Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CWE-18",
"title": "CWE-18"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2024-10-17T13:15:19.595269Z",
"id": "NCSC-2024-0411",
"initial_release_date": "2024-10-17T13:15:19.595269Z",
"revision_history": [
{
"date": "2024-10-17T13:15:19.595269Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph_mapviewer",
"product": {
"name": "spatial_and_graph_mapviewer",
"product_id": "CSAFPID-912561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-764250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-816800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning_-_micronaut",
"product": {
"name": "fleet_patching_and_provisioning_-_micronaut",
"product_id": "CSAFPID-1673492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning",
"product": {
"name": "fleet_patching_and_provisioning",
"product_id": "CSAFPID-1503603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-1673525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-816801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-1673405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_administration",
"product": {
"name": "application_express_administration",
"product_id": "CSAFPID-764731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_customers_plugin",
"product": {
"name": "application_express_customers_plugin",
"product_id": "CSAFPID-764732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_team_calendar_plugin",
"product": {
"name": "application_express_team_calendar_plugin",
"product_id": "CSAFPID-764733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-266119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-764779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-89587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-187448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-94075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-220886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-611394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-816317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-912567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1503612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1673479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_essbase",
"product": {
"name": "oracle_essbase",
"product_id": "CSAFPID-1650506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1673404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data",
"product": {
"name": "goldengate_big_data",
"product_id": "CSAFPID-764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-764752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-1673384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-816846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-611390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-764803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_veridata",
"product": {
"name": "goldengate_veridata",
"product_id": "CSAFPID-764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-219912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_stream_analytics",
"product": {
"name": "oracle_goldengate_stream_analytics",
"product_id": "CSAFPID-1650515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-764861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-1503640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_studio",
"product": {
"name": "oracle_goldengate_studio",
"product_id": "CSAFPID-1650835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate",
"product": {
"name": "oracle_goldengate",
"product_id": "CSAFPID-1650575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_nosql_database",
"product": {
"name": "oracle_nosql_database",
"product_id": "CSAFPID-1650584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_secure_backup",
"product": {
"name": "oracle_secure_backup",
"product_id": "CSAFPID-1650563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_sql_developer",
"product": {
"name": "oracle_sql_developer",
"product_id": "CSAFPID-1650638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-220643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-1673397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "oracle_application_express",
"product": {
"name": "oracle_application_express",
"product_id": "CSAFPID-1673144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle_corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-220886",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764822",
"CSAFPID-1650515",
"CSAFPID-1650638",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-89587",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json"
}
],
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-34169",
"cwe": {
"id": "CWE-192",
"name": "Integer Coercion Error"
},
"notes": [
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-36033",
"cwe": {
"id": "CWE-87",
"name": "Improper Neutralization of Alternate XSS Syntax"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-36033"
},
{
"cve": "CVE-2022-37454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
}
],
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38136",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-38136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json"
}
],
"title": "CVE-2022-38136"
},
{
"cve": "CVE-2022-40196",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json"
}
],
"title": "CVE-2022-40196"
},
{
"cve": "CVE-2022-41342",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json"
}
],
"title": "CVE-2022-41342"
},
{
"cve": "CVE-2022-42919",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-46337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
}
],
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-4759",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4759",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-4759"
},
{
"cve": "CVE-2023-4863",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json"
}
],
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-26031",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-26031"
},
{
"cve": "CVE-2023-26551",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-44981",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
}
],
"title": "CVE-2023-44981"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49083",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2408",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-2408"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5458",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-21131",
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"product_status": {
"known_affected": [
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"product_status": {
"known_affected": [
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21147",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-21233",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-21233"
},
{
"cve": "CVE-2024-21242",
"product_status": {
"known_affected": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
}
],
"title": "CVE-2024-21242"
},
{
"cve": "CVE-2024-21251",
"product_status": {
"known_affected": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
}
],
"title": "CVE-2024-21251"
},
{
"cve": "CVE-2024-21261",
"product_status": {
"known_affected": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-21261"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-23944",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23944",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23944"
},
{
"cve": "CVE-2024-24989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json"
}
],
"title": "CVE-2024-24989"
},
{
"cve": "CVE-2024-24990",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24990",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-24990"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-28887",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-28887"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-31079",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-31079"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-34161",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-34161"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35200",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-35200"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-36387"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37372",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-38356",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38356"
},
{
"cve": "CVE-2024-38357",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38357"
},
{
"cve": "CVE-2024-38472",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38472"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38474",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38474"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39573",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-39884",
"cwe": {
"id": "CWE-18",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-18",
"title": "CWE-18"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39884",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39884"
},
{
"cve": "CVE-2024-40725",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40725",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40725"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-45801"
}
]
}
NCSC-2024-0339
Vulnerability from csaf_ncscnl - Published: 2024-08-13 18:23 - Updated: 2024-08-13 18:23Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Mariner (Azure Linux).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden betreffen oudere kwetsbaarheden in diverse subcomponenten van de distro, zoals Python, Emacs, Qemu, Django, Curl, wget etc. welke in de nieuwe versie zijn verholpen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Partial String Comparison",
"title": "CWE-187"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "general",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Improper Check for Certificate Revocation",
"title": "CWE-299"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
"title": "CWE-95"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Mariner",
"tracking": {
"current_release_date": "2024-08-13T18:23:22.271316Z",
"id": "NCSC-2024-0339",
"initial_release_date": "2024-08-13T18:23:22.271316Z",
"revision_history": [
{
"date": "2024-08-13T18:23:22.271316Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cbl-mariner",
"product": {
"name": "cbl-mariner",
"product_id": "CSAFPID-1489521",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2601",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-2601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
}
],
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-3775",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3775.json"
}
],
"title": "CVE-2022-3775"
},
{
"cve": "CVE-2022-36648",
"references": [
{
"category": "self",
"summary": "CVE-2022-36648",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36648.json"
}
],
"title": "CVE-2022-36648"
},
{
"cve": "CVE-2019-3833",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-3833",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3833.json"
}
],
"title": "CVE-2019-3833"
},
{
"cve": "CVE-2021-3929",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3929",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3929.json"
}
],
"title": "CVE-2021-3929"
},
{
"cve": "CVE-2021-4158",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-4158",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4158.json"
}
],
"title": "CVE-2021-4158"
},
{
"cve": "CVE-2021-4206",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-4206",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4206.json"
}
],
"title": "CVE-2021-4206"
},
{
"cve": "CVE-2021-4207",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-4207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4207.json"
}
],
"title": "CVE-2021-4207"
},
{
"cve": "CVE-2022-26353",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-26353",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26353.json"
}
],
"title": "CVE-2022-26353"
},
{
"cve": "CVE-2022-35414",
"references": [
{
"category": "self",
"summary": "CVE-2022-35414",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-35414.json"
}
],
"title": "CVE-2022-35414"
},
{
"cve": "CVE-2023-3354",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3354",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3354.json"
}
],
"title": "CVE-2023-3354"
},
{
"cve": "CVE-2022-3872",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "other",
"text": "Off-by-one Error",
"title": "CWE-193"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3872",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3872.json"
}
],
"title": "CVE-2022-3872"
},
{
"cve": "CVE-2022-4144",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-4144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4144.json"
}
],
"title": "CVE-2022-4144"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-29404",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-29404",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29404.json"
}
],
"title": "CVE-2023-29404"
},
{
"cve": "CVE-2023-29402",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-29402",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29402.json"
}
],
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2019-3816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-3816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3816.json"
}
],
"title": "CVE-2019-3816"
},
{
"cve": "CVE-2021-3750",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3750.json"
}
],
"title": "CVE-2021-3750"
},
{
"cve": "CVE-2022-0358",
"cwe": {
"id": "CWE-273",
"name": "Improper Check for Dropped Privileges"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-0358",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0358.json"
}
],
"title": "CVE-2022-0358"
},
{
"cve": "CVE-2022-26354",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-26354",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26354.json"
}
],
"title": "CVE-2022-26354"
},
{
"cve": "CVE-2022-3165",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3165",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3165.json"
}
],
"title": "CVE-2022-3165"
},
{
"cve": "CVE-2022-2962",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-2962",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2962.json"
}
],
"title": "CVE-2022-2962"
},
{
"cve": "CVE-2022-41722",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-41722",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41722.json"
}
],
"title": "CVE-2022-41722"
},
{
"cve": "CVE-2022-29526",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-29526",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-29526.json"
}
],
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2007-4559",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2007-4559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2007/CVE-2007-4559.json"
}
],
"title": "CVE-2007-4559"
},
{
"cve": "CVE-2019-9674",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-9674",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-9674.json"
}
],
"title": "CVE-2019-9674"
},
{
"cve": "CVE-2017-18207",
"references": [
{
"category": "self",
"summary": "CVE-2017-18207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-18207.json"
}
],
"title": "CVE-2017-18207"
},
{
"cve": "CVE-2019-20907",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-20907",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-20907.json"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2021-23336",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-23336",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23336.json"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2017-17522",
"references": [
{
"category": "self",
"summary": "CVE-2017-17522",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-17522.json"
}
],
"title": "CVE-2017-17522"
},
{
"cve": "CVE-2024-6655",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6655",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6655.json"
}
],
"title": "CVE-2024-6655"
},
{
"cve": "CVE-2024-2466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
}
],
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-39331",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
"title": "CWE-95"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39331",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39331.json"
}
],
"title": "CVE-2024-39331"
},
{
"cve": "CVE-2021-43565",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-43565",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43565.json"
}
],
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2024-39277",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39277",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39277.json"
}
],
"title": "CVE-2024-39277"
},
{
"cve": "CVE-2024-38780",
"cwe": {
"id": "CWE-371",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38780",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38780.json"
}
],
"title": "CVE-2024-38780"
},
{
"cve": "CVE-2024-39292",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39292",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39292.json"
}
],
"title": "CVE-2024-39292"
},
{
"cve": "CVE-2024-39482",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39482",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39482.json"
}
],
"title": "CVE-2024-39482"
},
{
"cve": "CVE-2024-39484",
"references": [
{
"category": "self",
"summary": "CVE-2024-39484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39484.json"
}
],
"title": "CVE-2024-39484"
},
{
"cve": "CVE-2024-39495",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39495",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39495.json"
}
],
"title": "CVE-2024-39495"
},
{
"cve": "CVE-2024-40902",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-40902",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40902.json"
}
],
"title": "CVE-2024-40902"
},
{
"cve": "CVE-2024-41110",
"cwe": {
"id": "CWE-187",
"name": "Partial String Comparison"
},
"notes": [
{
"category": "other",
"text": "Partial String Comparison",
"title": "CWE-187"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-41110",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41110.json"
}
],
"title": "CVE-2024-41110"
},
{
"cve": "CVE-2024-37298",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37298",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37298.json"
}
],
"title": "CVE-2024-37298"
},
{
"cve": "CVE-2024-0397",
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-38571",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38571",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38571.json"
}
],
"title": "CVE-2024-38571"
},
{
"cve": "CVE-2024-42077",
"references": [
{
"category": "self",
"summary": "CVE-2024-42077",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42077.json"
}
],
"title": "CVE-2024-42077"
},
{
"cve": "CVE-2024-39473",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39473.json"
}
],
"title": "CVE-2024-39473"
},
{
"cve": "CVE-2024-26900",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26900",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26900.json"
}
],
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-39474",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39474.json"
}
],
"title": "CVE-2024-39474"
},
{
"cve": "CVE-2024-42073",
"references": [
{
"category": "self",
"summary": "CVE-2024-42073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42073.json"
}
],
"title": "CVE-2024-42073"
},
{
"cve": "CVE-2024-42074",
"references": [
{
"category": "self",
"summary": "CVE-2024-42074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42074.json"
}
],
"title": "CVE-2024-42074"
},
{
"cve": "CVE-2024-42075",
"references": [
{
"category": "self",
"summary": "CVE-2024-42075",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42075.json"
}
],
"title": "CVE-2024-42075"
},
{
"cve": "CVE-2024-42078",
"references": [
{
"category": "self",
"summary": "CVE-2024-42078",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42078.json"
}
],
"title": "CVE-2024-42078"
},
{
"cve": "CVE-2024-0853",
"cwe": {
"id": "CWE-299",
"name": "Improper Check for Certificate Revocation"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Certificate Revocation",
"title": "CWE-299"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-0853",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0853.json"
}
],
"title": "CVE-2024-0853"
},
{
"cve": "CVE-2024-2004",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
}
],
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-38662",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38662",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38662.json"
}
],
"title": "CVE-2024-38662"
},
{
"cve": "CVE-2024-36288",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-36288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36288.json"
}
],
"title": "CVE-2024-36288"
},
{
"cve": "CVE-2024-39480",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39480",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39480.json"
}
],
"title": "CVE-2024-39480"
},
{
"cve": "CVE-2024-39476",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "other",
"text": "Deadlock",
"title": "CWE-833"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39476.json"
}
],
"title": "CVE-2024-39476"
},
{
"cve": "CVE-2024-39475",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39475.json"
}
],
"title": "CVE-2024-39475"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-26461",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26461",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26461.json"
}
],
"title": "CVE-2024-26461"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-6104",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6104.json"
}
],
"title": "CVE-2024-6104"
},
{
"cve": "CVE-2024-6257",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6257.json"
}
],
"title": "CVE-2024-6257"
},
{
"cve": "CVE-2024-23722",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-23722",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23722.json"
}
],
"title": "CVE-2024-23722"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-38583",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38583",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38583.json"
}
],
"title": "CVE-2024-38583"
},
{
"cve": "CVE-2024-39493",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39493",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39493.json"
}
],
"title": "CVE-2024-39493"
},
{
"cve": "CVE-2024-42068",
"references": [
{
"category": "self",
"summary": "CVE-2024-42068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42068.json"
}
],
"title": "CVE-2024-42068"
},
{
"cve": "CVE-2024-39489",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39489",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39489.json"
}
],
"title": "CVE-2024-39489"
},
{
"cve": "CVE-2024-42070",
"references": [
{
"category": "self",
"summary": "CVE-2024-42070",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42070.json"
}
],
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42076",
"references": [
{
"category": "self",
"summary": "CVE-2024-42076",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42076.json"
}
],
"title": "CVE-2024-42076"
},
{
"cve": "CVE-2024-42080",
"references": [
{
"category": "self",
"summary": "CVE-2024-42080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42080.json"
}
],
"title": "CVE-2024-42080"
},
{
"cve": "CVE-2024-38428",
"cwe": {
"id": "CWE-115",
"name": "Misinterpretation of Input"
},
"notes": [
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38428.json"
}
],
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-42082",
"references": [
{
"category": "self",
"summary": "CVE-2024-42082",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42082.json"
}
],
"title": "CVE-2024-42082"
},
{
"cve": "CVE-2022-48788",
"references": [
{
"category": "self",
"summary": "CVE-2022-48788",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48788.json"
}
],
"title": "CVE-2022-48788"
},
{
"cve": "CVE-2023-52340",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52340",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52340.json"
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2022-48841",
"references": [
{
"category": "self",
"summary": "CVE-2022-48841",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48841.json"
}
],
"title": "CVE-2022-48841"
},
{
"cve": "CVE-2024-39485",
"references": [
{
"category": "self",
"summary": "CVE-2024-39485",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39485.json"
}
],
"title": "CVE-2024-39485"
},
{
"cve": "CVE-2024-39483",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39483",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39483.json"
}
],
"title": "CVE-2024-39483"
},
{
"cve": "CVE-2024-42071",
"references": [
{
"category": "self",
"summary": "CVE-2024-42071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42071.json"
}
],
"title": "CVE-2024-42071"
},
{
"cve": "CVE-2024-42072",
"references": [
{
"category": "self",
"summary": "CVE-2024-42072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42072.json"
}
],
"title": "CVE-2024-42072"
},
{
"cve": "CVE-2024-42237",
"references": [
{
"category": "self",
"summary": "CVE-2024-42237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42237.json"
}
],
"title": "CVE-2024-42237"
},
{
"cve": "CVE-2024-42083",
"references": [
{
"category": "self",
"summary": "CVE-2024-42083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42083.json"
}
],
"title": "CVE-2024-42083"
}
]
}
NCSC-2025-0021
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:30 - Updated: 2025-01-22 13:30Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-01-22T13:30:50.189632Z",
"id": "NCSC-2025-0021",
"initial_release_date": "2025-01-22T13:30:50.189632Z",
"revision_history": [
{
"date": "2025-01-22T13:30:50.189632Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1727475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751254",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1751303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1751300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1751253",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1751090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1751246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1751231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1751241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751230",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1751243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-1751218",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-916906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41727",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json"
}
],
"title": "CVE-2022-41727"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5981",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
}
],
"title": "CVE-2023-5981"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-7256",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2023-7256"
},
{
"cve": "CVE-2023-29407",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29407",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2023-29407"
},
{
"cve": "CVE-2023-29408",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2023-29408"
},
{
"cve": "CVE-2023-40577",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-40577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2023-40577"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46604",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46604",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
}
],
"title": "CVE-2023-46604"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650777",
"CSAFPID-1650778",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-1442",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1442",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-1442"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "other",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-7885",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7885",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-7885"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-24791",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-24791"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27309",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27309",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-27309"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-28835",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28835"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33600",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "other",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47535"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-47803",
"cwe": {
"id": "CWE-209",
"name": "Generation of Error Message Containing Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47803"
},
{
"cve": "CVE-2024-47804",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47804"
},
{
"cve": "CVE-2024-49766",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49766",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-49766"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50379",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-50379"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2024-54677",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-54677"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-21542",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21542",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21542"
},
{
"cve": "CVE-2025-21544",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21544",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21544"
},
{
"cve": "CVE-2025-21554",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21554"
}
]
}
NCSC-2025-0027
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:36 - Updated: 2025-01-22 13:36Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn producten, waaronder Oracle Fusion Middleware, Oracle WebLogic Server, en Oracle HTTP Server.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich in verschillende Oracle producten, waaronder Oracle WebLogic Server versies 12.2.1.4.0 en 14.1.1.0.0, die het mogelijk maken voor ongeauthenticeerde kwaadwillenden om toegang te krijgen tot kritieke gegevens. Dit kan leiden tot ernstige gevolgen voor de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen. De kwetsbaarheid in Oracle HTTP Server versie 12.2.1.4.0 stelt kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, met een CVSS-score van 5.3, terwijl de kwetsbaarheid in WebLogic Server een CVSS-score van 9.8 heeft, wat wijst op een kritieke impact. Kwaadwillenden kunnen ook gebruik maken van kwetsbaarheden in Oracle Fusion Middleware en andere producten om Denial-of-Service (DoS) aanvallen uit te voeren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
},
{
"category": "general",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Fusion Middleware",
"tracking": {
"current_release_date": "2025-01-22T13:36:27.908718Z",
"id": "NCSC-2025-0027",
"initial_release_date": "2025-01-22T13:36:27.908718Z",
"revision_history": [
{
"date": "2025-01-22T13:36:27.908718Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "http_server",
"product": {
"name": "http_server",
"product_id": "CSAFPID-93909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "http_server",
"product": {
"name": "http_server",
"product_id": "CSAFPID-40303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "http_server",
"product": {
"name": "http_server",
"product_id": "CSAFPID-912074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:http_server:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware_mapviewer",
"product": {
"name": "fusion_middleware_mapviewer",
"product_id": "CSAFPID-226018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-1646487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-332789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-1747074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.19.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-342815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-271904",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-503474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-1674670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:8.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "weblogic_server",
"product": {
"name": "weblogic_server",
"product_id": "CSAFPID-3661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "weblogic_server",
"product": {
"name": "weblogic_server",
"product_id": "CSAFPID-3660",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "weblogic_server",
"product": {
"name": "weblogic_server",
"product_id": "CSAFPID-1973",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "weblogic_server",
"product": {
"name": "weblogic_server",
"product_id": "CSAFPID-1751293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_service",
"product": {
"name": "security_service",
"product_id": "CSAFPID-199820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:security_service:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_activity_monitoring",
"product": {
"name": "business_activity_monitoring",
"product_id": "CSAFPID-228157",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_activity_monitoring__bam_",
"product": {
"name": "business_activity_monitoring__bam_",
"product_id": "CSAFPID-764927",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_activity_monitoring__bam_:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_activity_monitoring__bam_",
"product": {
"name": "business_activity_monitoring__bam_",
"product_id": "CSAFPID-764928",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_activity_monitoring__bam_:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "identity_manager",
"product": {
"name": "identity_manager",
"product_id": "CSAFPID-220164",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:identity_manager:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "managed_file_transfer",
"product": {
"name": "managed_file_transfer",
"product_id": "CSAFPID-204581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "middleware_common_libraries_and_tools",
"product": {
"name": "middleware_common_libraries_and_tools",
"product_id": "CSAFPID-94398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "middleware_common_libraries_and_tools",
"product": {
"name": "middleware_common_libraries_and_tools",
"product_id": "CSAFPID-94309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "middleware_common_libraries_and_tools",
"product": {
"name": "middleware_common_libraries_and_tools",
"product_id": "CSAFPID-94393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_process_management_suite",
"product": {
"name": "business_process_management_suite",
"product_id": "CSAFPID-9043",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_process_management_suite",
"product": {
"name": "business_process_management_suite",
"product_id": "CSAFPID-9642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "outside_in_technology",
"product": {
"name": "outside_in_technology",
"product_id": "CSAFPID-1260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "outside_in_technology",
"product": {
"name": "outside_in_technology",
"product_id": "CSAFPID-912053",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "webcenter_portal",
"product": {
"name": "webcenter_portal",
"product_id": "CSAFPID-135359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "webcenter_portal",
"product": {
"name": "webcenter_portal",
"product_id": "CSAFPID-45194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12415",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-45194",
"CSAFPID-135359",
"CSAFPID-1646487",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-204581",
"CSAFPID-94309",
"CSAFPID-1260",
"CSAFPID-3661",
"CSAFPID-3660",
"CSAFPID-1973",
"CSAFPID-94393",
"CSAFPID-226018",
"CSAFPID-764927",
"CSAFPID-764928",
"CSAFPID-9043",
"CSAFPID-93909",
"CSAFPID-94398"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-12415",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-12415.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-45194",
"CSAFPID-135359",
"CSAFPID-1646487",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-204581",
"CSAFPID-94309",
"CSAFPID-1260",
"CSAFPID-3661",
"CSAFPID-3660",
"CSAFPID-1973",
"CSAFPID-94393",
"CSAFPID-226018",
"CSAFPID-764927",
"CSAFPID-764928",
"CSAFPID-9043",
"CSAFPID-93909",
"CSAFPID-94398"
]
}
],
"title": "CVE-2019-12415"
},
{
"cve": "CVE-2023-7272",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7272.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2023-7272"
},
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-271904"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-271904"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44483",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-271904",
"CSAFPID-94393",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44483",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44483.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-271904",
"CSAFPID-94393",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157"
]
}
],
"title": "CVE-2023-44483"
},
{
"cve": "CVE-2023-49582",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49582",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2023-49582"
},
{
"cve": "CVE-2023-51775",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-94393",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157",
"CSAFPID-271904"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-94393",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157",
"CSAFPID-271904"
]
}
],
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-8096",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8096",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8096.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-8096"
},
{
"cve": "CVE-2024-23635",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-94393",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157",
"CSAFPID-271904"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23635",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23635.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-94393",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157",
"CSAFPID-271904"
]
}
],
"title": "CVE-2024-23635"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973",
"CSAFPID-1747074",
"CSAFPID-1674670",
"CSAFPID-503474"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29857",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973",
"CSAFPID-1747074",
"CSAFPID-1674670",
"CSAFPID-503474"
]
}
],
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-30171",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30171.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2024-30171"
},
{
"cve": "CVE-2024-30172",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30172",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30172.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2024-30172"
},
{
"cve": "CVE-2024-34447",
"cwe": {
"id": "CWE-706",
"name": "Use of Incorrectly-Resolved Name or Reference"
},
"notes": [
{
"category": "other",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34447",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34447.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2024-34447"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-204581"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-204581"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-199820"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-199820"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-199820"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-199820"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "other",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94309",
"CSAFPID-220164"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-94309",
"CSAFPID-220164"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94309",
"CSAFPID-220164"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-94309",
"CSAFPID-220164"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-9642",
"CSAFPID-226018",
"CSAFPID-45194"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-9642",
"CSAFPID-226018",
"CSAFPID-45194"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9642",
"CSAFPID-228157",
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-271904",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-226018",
"CSAFPID-45194"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9642",
"CSAFPID-228157",
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-271904",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-226018",
"CSAFPID-45194"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912053",
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912053",
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912053",
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912053",
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912053",
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-271904",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912053",
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-271904",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157"
]
}
],
"title": "CVE-2024-47072"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751293",
"CSAFPID-45194",
"CSAFPID-1973",
"CSAFPID-3660"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751293",
"CSAFPID-45194",
"CSAFPID-1973",
"CSAFPID-3660"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9642"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9642"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2025-21498",
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21498",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21498.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2025-21498"
},
{
"cve": "CVE-2025-21535",
"product_status": {
"known_affected": [
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2025-21535"
},
{
"cve": "CVE-2025-21549",
"product_status": {
"known_affected": [
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1973"
]
}
],
"title": "CVE-2025-21549"
}
]
}
RHSA-2024:6166
Vulnerability from csaf_redhat - Published: 2024-09-03 16:51 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* krb5: GSS message token handling (CVE-2024-37370)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6166",
"url": "https://access.redhat.com/errata/RHSA-2024:6166"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6166.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:26+00:00",
"generator": {
"date": "2025-12-09T09:09:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:6166",
"initial_release_date": "2024-09-03T16:51:35+00:00",
"revision_history": [
{
"date": "2024-09-03T16:51:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-03T16:51:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-server-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.aarch64",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.aarch64",
"product_id": "libkadm5-0:1.21.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-server-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.ppc64le",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.ppc64le",
"product_id": "libkadm5-0:1.21.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-server-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.i686",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.i686",
"product_id": "libkadm5-0:1.21.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-server-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.x86_64",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.x86_64",
"product_id": "libkadm5-0:1.21.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-server-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.s390x",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.s390x",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.s390x",
"product_id": "libkadm5-0:1.21.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.21.1-2.el9_4.src",
"product": {
"name": "krb5-0:1.21.1-2.el9_4.src",
"product_id": "krb5-0:1.21.1-2.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.21.1-2.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-2.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src"
},
"product_reference": "krb5-0:1.21.1-2.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-2.el9_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src"
},
"product_reference": "krb5-0:1.21.1-2.el9_4.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-03T16:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6166"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-03T16:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6166"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-0:1.21.1-2.el9_4.src",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-debugsource-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-devel-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-0:1.21.1-2.el9_4.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2024:11109
Vulnerability from csaf_redhat - Published: 2024-12-16 15:47 - Updated: 2026-01-04 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated service-interconnect container images are now available for Service Interconnect 1.5 for RHEL 9.",
"title": "Topic"
},
{
"category": "general",
"text": "Users of service-interconnect 1.5 rhel9 container images are advised\nto upgrade to these updated images, which contain backported patches to correct security issues and fix bugs. \nUsers of these images are also encouraged to rebuild all container images that depend on these images.\nYou can find images updated by this advisory the in Red Hat Container Catalog",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:11109",
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "2321987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2321987"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_11109.json"
}
],
"title": "Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.5",
"tracking": {
"current_release_date": "2026-01-04T12:13:31+00:00",
"generator": {
"date": "2026-01-04T12:13:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:11109",
"initial_release_date": "2024-12-16T15:47:02+00:00",
"revision_history": [
{
"date": "2024-12-16T15:47:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-12-16T15:47:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-04T12:13:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Service Interconnect 1",
"product": {
"name": "Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_interconnect:1::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Service Interconnect"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"product": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"product": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-6"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-4"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"product": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"product": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"product": {
"name": "service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"product_id": "service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-operator-bundle\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-6"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-4"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"product": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"product": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"product": {
"name": "service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"product_id": "service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-operator-bundle\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-6"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-4"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"product": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"product": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-6"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64"
},
"product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x"
},
"product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le"
},
"product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64"
},
"product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64"
},
"product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x"
},
"product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le"
},
"product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64"
},
"product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64"
},
"product_reference": "service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64"
},
"product_reference": "service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2024-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: HTTP/2 push headers memory-leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2398"
},
{
"category": "external",
"summary": "RHBZ#2270498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2398",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2398"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2024-2398.html",
"url": "https://curl.se/docs/CVE-2024-2398.html"
}
],
"release_date": "2024-03-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: HTTP/2 push headers memory-leak"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-08-20T17:50:04+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2306158"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Possible denial of service in X.509 name checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because it primarily affects specific use cases involving certificate name checks against otherName subject alternative names, a scenario that is not commonly encountered. The issue only triggers a denial of service (DoS) by causing an abnormal application termination, without compromising the integrity, confidentiality, or availability of data at a broader scale. Additionally, TLS servers, which typically don\u0027t perform reference identity checks during client certificate validation, are largely unaffected. The impact is localized to certain TLS clients performing specific name comparisons, reducing the overall risk profile and justifying the moderate severity classification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6119"
},
{
"category": "external",
"summary": "RHBZ#2306158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2306158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6119",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6119"
},
{
"category": "external",
"summary": "https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj",
"url": "https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj"
}
],
"release_date": "2024-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Possible denial of service in X.509 name checks"
},
{
"cve": "CVE-2024-6345",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2024-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297771"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the package_index module of pypa/setuptools. Affected versions of this package allow remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack does not include setuptools. The ImcSdk component uses it only during compile time in our build systems, and we do not support recompiling SRPMs. As a result, Red Hat OpenStack is not affected by this flaw.\n\nPython 2.7.18 was marked End of Life on 04/20/2020. No patches for Python 2 would be made available.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6345"
},
{
"category": "external",
"summary": "RHBZ#2297771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0",
"url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5",
"url": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"
}
],
"release_date": "2024-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
},
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"discovery_date": "2024-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279632"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib2: Signal subscription vulnerabilities",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34397"
},
{
"category": "external",
"summary": "RHBZ#2279632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279632"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/05/07/5",
"url": "https://www.openwall.com/lists/oss-security/2024/05/07/5"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib2: Signal subscription vulnerabilities"
},
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2024-08-30T03:20:06.675968+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308615"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libexpat\u0027s xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: Negative Length Parsing Vulnerability in libexpat",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-45490 vulnerability is rated as moderate severity because while it allows for memory corruption through improper argument handling in XML_ParseBuffer, the exploitability is limited. Specifically, it requires an unlikely scenario where the input passed to the function has a negative length (len \u003c 0), which would typically not occur in well-formed applications. Moreover, while the impact includes denial of service (DoS), the conditions necessary for arbitrary code execution are non-trivial, requiring specific exploitation of memory corruption. Since it primarily leads to application crashes without an easily accessible attack vector for remote code execution, the risk is lower compared to higher-severity vulnerabilities that offer more direct pathways to exploitation.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow or Wraparound vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations and configuration controls enforce secure system and software settings, while least functionality reduces the attack surface by disabling unnecessary services and ports. In the event of successful exploitation, process isolation ensures that memory corruption is contained within the originating process, preventing it from affecting other processes or the system as a whole. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions. These controls help detect and prevent malicious code that attempts to exploit integer overflow vulnerabilities through mechanisms like file integrity checks and patch management. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are used to enhance resilience against integer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45490"
},
{
"category": "external",
"summary": "RHBZ#2308615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45490"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/887",
"url": "https://github.com/libexpat/libexpat/issues/887"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/890",
"url": "https://github.com/libexpat/libexpat/pull/890"
}
],
"release_date": "2024-08-30T03:15:03.757000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: Negative Length Parsing Vulnerability in libexpat"
},
{
"cve": "CVE-2024-45491",
"discovery_date": "2024-08-30T03:20:09.474759+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308616"
}
],
"notes": [
{
"category": "description",
"text": "An issue was found in libexpat\u2019s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: Integer Overflow or Wraparound",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as Moderate severity rather than Important due to its reliance on specific conditions for exploitation. The integer overflow in dtdCopy affecting nDefaultAtts is limited to 32-bit platforms, reducing the attack surface as many modern systems operate on 64-bit architectures. Additionally, while the impact can lead to denial of service and potentially arbitrary code execution, the latter requires precise manipulation of the overflow condition, which may be non-trivial for attackers to achieve reliably. The constrained platform scope and the complexity of exploitation lower the overall severity, though it still poses a risk in environments where 32-bit systems are prevalent.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45491"
},
{
"category": "external",
"summary": "RHBZ#2308616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308616"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45491"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/888",
"url": "https://github.com/libexpat/libexpat/issues/888"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/891",
"url": "https://github.com/libexpat/libexpat/pull/891"
}
],
"release_date": "2024-08-30T03:15:03.850000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: Integer Overflow or Wraparound"
},
{
"cve": "CVE-2024-45492",
"discovery_date": "2024-08-30T03:20:11.638476+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308617"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libexpat\u0027s internal nextScaffoldPart function in xmlparse.c. It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: integer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "CVE-2024-45492 is categorized as a Moderate severity issue rather than Important due to the specific conditions required for exploitation and the limited scope of impact. While an integer overflow in the nextScaffoldPart function on 32-bit platforms can potentially lead to denial of service (DoS) or, in rare cases, arbitrary code execution, the vulnerability is platform-specific, affecting only 32-bit architectures with particular handling of UINT_MAX and SIZE_MAX. Additionally, exploiting the overflow for arbitrary code execution would require precise manipulation of memory, making it a less likely attack vector. The primary risk of DoS, without guaranteed escalation to remote code execution, further justifies the moderate severity classification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45492"
},
{
"category": "external",
"summary": "RHBZ#2308617",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308617"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45492"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/889",
"url": "https://github.com/libexpat/libexpat/issues/889"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/892",
"url": "https://github.com/libexpat/libexpat/pull/892"
}
],
"release_date": "2024-08-30T03:15:03.930000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-16T15:47:02+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:01b7f735b8efd48b3406d116a7885f4545efa21786fd96ea3479573b72181e6c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:2dedeeda52b1701d005dee4c2277c949d978214d32fffbdfc63e7c5ead8f1782_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7460ced07d36f6ce528561e92db8f212b2db38ecefa6f28b1c6d336f676f5010_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:7dd1ff26d428fc7b075b0ccd4e19ecce723029e2e3b957c59716ceb48a532f09_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:03c5da9f3d13f3d5c54072cec23d09e49c18925d389817f3c75ab73e94be9e45_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2da92855aa7fc0a5b17909ca2e43950a9785ca3b58b001880caaddfe69bd7c1b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:bdf007b74711d3bbd1986a29c9702e5b237edc34b2db86c70df7c8fd47e54454_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:ef40b43b27d8bd205d01ee1a6e11fbceaa345ab72ee6d39e2d436fa1b99a9aaa_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:3bc6fa2665020345f5e9a94bdb4fc11560336213889463812490ea2bd8a78bff_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:554f51fbd35480c5779d801f129e06045399f4bedeee7b3ec2a4bc839a0a4154_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:771f88b6a5b042c07e652196b406da2f88806334f882d418514f20de9cf1e9ee_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:826ce2adc3ce66628150e118662fd7871f2b9fb7de1507041f5f5f20e6558bfa_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:a4873e1ba82b7a55bccf7e1664cc3ecb51bb5e12d09dba4e1da3f3282cf3f1f9_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:f934d109a75fbac4316db68a7409a95bf848d6c99eacd925ff352204e891f1a0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:47b2380c1a4f1b66fb8ea1d56cb55d5d48d157c3cd766910fa7a5967582901d6_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5b9714c08022c3b1a94c779aa2daa98bb2965f6808f3049fe57f6045cd8fd534_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:72fcdf31e9b144f6bfc9a13dff8f720e963b7e49d6ef773522bdb5946cf0e1b9_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:b193eace13666b71a525f07627b8e727fa6594db0f9086940607be456f0dbe5f_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1c6e952f2c85c384a21c455e7a5d3788d96c23f5b76737fc19ec91782a4a7492_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1e7ec0d2278b508f4e6125cda83b09af84787ae37de6ca32e1866029c2f85d8c_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:859683e6f8eca6302e197113eb7152e7779a3de72c59988b305bb0a8bc13cbe5_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:97e80a5d2ae898d4262a52e8e4f31a86c011b694160c47ce4074015ebab8a7f4_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:35be4ab2c944e950b7c635a0342aefbd5b13a3cf4d9f41828adf4e685e80bccf_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:8674ea245869c168353047d9bbf963cba13508d982b6ae288f15ab5540805f82_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:9268f1f878db35a8e9b5171e1e9bb517c329b8bd98ad74a1d0550baf67d6c501_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ae2fd33a7da6eadafe9c1321397000a283ea67690bcc9f41458b8401e06d309c_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: integer overflow"
}
]
}
RHSA-2024:4743
Vulnerability from csaf_redhat - Published: 2024-07-23 15:32 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37370)\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4743",
"url": "https://access.redhat.com/errata/RHSA-2024:4743"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4743.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:21+00:00",
"generator": {
"date": "2025-12-09T09:09:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:4743",
"initial_release_date": "2024-07-23T15:32:49+00:00",
"revision_history": [
{
"date": "2024-07-23T15:32:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-23T15:32:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-26.el8_8.2.src",
"product": {
"name": "krb5-0:1.18.2-26.el8_8.2.src",
"product_id": "krb5-0:1.18.2-26.el8_8.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-26.el8_8.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-server-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.i686",
"product_id": "libkadm5-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-server-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.s390x",
"product_id": "libkadm5-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-26.el8_8.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src"
},
"product_reference": "krb5-0:1.18.2-26.el8_8.2.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:32:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4743"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T15:32:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4743"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.2.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.2.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2025:1673
Vulnerability from csaf_redhat - Published: 2025-02-19 11:10 - Updated: 2026-01-08 03:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the mysql:8.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nSecurity Fix(es):\n\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n\n* mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n\n* mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n\n* mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n\n* mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n\n* mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n\n* mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n\n* mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n\n* mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n\n* mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n\n* mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n\n* curl: curl netrc password leak (CVE-2024-11053)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n\n* mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n\n* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n\n* mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n\n* mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n\n* mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n\n* mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n\n* mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n\n* mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n\n* mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:1673",
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2301888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
},
{
"category": "external",
"summary": "2318857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
},
{
"category": "external",
"summary": "2318858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
},
{
"category": "external",
"summary": "2318870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
},
{
"category": "external",
"summary": "2318873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
},
{
"category": "external",
"summary": "2318874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
},
{
"category": "external",
"summary": "2318876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
},
{
"category": "external",
"summary": "2318882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
},
{
"category": "external",
"summary": "2318883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
},
{
"category": "external",
"summary": "2318884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
},
{
"category": "external",
"summary": "2318885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
},
{
"category": "external",
"summary": "2318886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
},
{
"category": "external",
"summary": "2318897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
},
{
"category": "external",
"summary": "2318900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
},
{
"category": "external",
"summary": "2318905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
},
{
"category": "external",
"summary": "2318914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
},
{
"category": "external",
"summary": "2318922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
},
{
"category": "external",
"summary": "2318923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
},
{
"category": "external",
"summary": "2318925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
},
{
"category": "external",
"summary": "2318926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
},
{
"category": "external",
"summary": "2318927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
},
{
"category": "external",
"summary": "2331191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
},
{
"category": "external",
"summary": "2339218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
},
{
"category": "external",
"summary": "2339220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
},
{
"category": "external",
"summary": "2339221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
},
{
"category": "external",
"summary": "2339226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
},
{
"category": "external",
"summary": "2339231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
},
{
"category": "external",
"summary": "2339236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
},
{
"category": "external",
"summary": "2339238",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
},
{
"category": "external",
"summary": "2339243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
},
{
"category": "external",
"summary": "2339247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
},
{
"category": "external",
"summary": "2339252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
},
{
"category": "external",
"summary": "2339259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
},
{
"category": "external",
"summary": "2339266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
},
{
"category": "external",
"summary": "2339270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
},
{
"category": "external",
"summary": "2339271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
},
{
"category": "external",
"summary": "2339275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
},
{
"category": "external",
"summary": "2339277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
},
{
"category": "external",
"summary": "2339281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
},
{
"category": "external",
"summary": "2339284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
},
{
"category": "external",
"summary": "2339291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
},
{
"category": "external",
"summary": "2339293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
},
{
"category": "external",
"summary": "2339295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
},
{
"category": "external",
"summary": "2339299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
},
{
"category": "external",
"summary": "2339300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
},
{
"category": "external",
"summary": "2339304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
},
{
"category": "external",
"summary": "2339305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
},
{
"category": "external",
"summary": "RHEL-40866",
"url": "https://issues.redhat.com/browse/RHEL-40866"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1673.json"
}
],
"title": "Red Hat Security Advisory: mysql:8.0 security update",
"tracking": {
"current_release_date": "2026-01-08T03:16:55+00:00",
"generator": {
"date": "2026-01-08T03:16:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:1673",
"initial_release_date": "2025-02-19T11:10:11+00:00",
"revision_history": [
{
"date": "2025-02-19T11:10:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-02-19T11:10:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T03:16:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294581"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the \u0027no overlap\u0027 response in ALPN or uses the output as the opportunistic protocol in NPN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_select_next_proto buffer overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "RHBZ#2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: SSL_select_next_proto buffer overread"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T04:33:09+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl, where libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: ASN.1 date parser overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is classified as low severity because it primarily results in a heap buffer over-read rather than a direct memory corruption or code execution risk. Since the ASN.1 parsing occurs after a successful TLS handshake, the malformed certificate must first bypass the TLS library\u0027s validation, which significantly reduces the likelihood of exploitation. \n\nAdditionally, the impact is limited to a potential crash or unintended heap data exposure through CURLINFO_CERTINFO, but not arbitrary code execution. The requirement for a specific TLS backend configuration and the controlled nature of the memory read further minimize its exploitability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"category": "external",
"summary": "RHBZ#2301888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\n\nRed Hat build of curl uses OpenSSL, which is not included in the affected list of GnuTLS, Schannel, Secure Transport and mbedTLS. Inspect which TLS backend is in use by running:\n\n$ curl --version\n\nCheck the reference for curl handled by the maintainers which may contain more relevant information around this vulnerability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libcurl: ASN.1 date parser overread"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-12-09T17:25:06.949000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331191"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl netrc password leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects curl when a `.netrc` file is used and a redirect is performed. Additionally, the `.netrc` must match the target hostname but the followed-to host does not have a password or both login and password configured.\n\nExample of a vulnerable .netrc configuration:\n\n~~~\nmachine a.com\n login alice\n password alicespassword\n\ndefault\n login bob\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"category": "external",
"summary": "RHBZ#2331191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "workaround",
"details": "Avoid using the .netrc file together with redirects.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: curl netrc password leak"
},
{
"cve": "CVE-2024-21193",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318923"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: PS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"category": "external",
"summary": "RHBZ#2318923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:35.495000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: PS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21194",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318914"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"category": "external",
"summary": "RHBZ#2318914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:35.850000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21196",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318858"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"category": "external",
"summary": "RHBZ#2318858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:36.816000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21197",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318874"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"category": "external",
"summary": "RHBZ#2318874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.130000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21198",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318925"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DDL unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"category": "external",
"summary": "RHBZ#2318925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.426000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DDL unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21199",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318922"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"category": "external",
"summary": "RHBZ#2318922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.770000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21201",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318882"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"category": "external",
"summary": "RHBZ#2318882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:38.423000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21203",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318885"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: FTS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"category": "external",
"summary": "RHBZ#2318885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:39.267000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: FTS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21212",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318886"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor). Supported versions that are affected are 8.0.39 and prior and 8.4.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"category": "external",
"summary": "RHBZ#2318886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:42.238000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21213",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318905"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"category": "external",
"summary": "RHBZ#2318905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:42.559000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21218",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318876"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"category": "external",
"summary": "RHBZ#2318876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:44.128000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21219",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318897"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DML unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"category": "external",
"summary": "RHBZ#2318897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:44.460000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DML unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21230",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318900"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"category": "external",
"summary": "RHBZ#2318900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:45.238000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21231",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318873"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"category": "external",
"summary": "RHBZ#2318873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:45.633000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21236",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318883"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"category": "external",
"summary": "RHBZ#2318883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.226000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21237",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318884"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"category": "external",
"summary": "RHBZ#2318884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.598000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21238",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318857"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.1 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"category": "external",
"summary": "RHBZ#2318857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.971000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21239",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318927"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"category": "external",
"summary": "RHBZ#2318927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:48.332000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21241",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318870"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"category": "external",
"summary": "RHBZ#2318870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:48.644000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21247",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318926"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"category": "external",
"summary": "RHBZ#2318926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:50.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2025-21490",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the MySQL Server component: InnoDB. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs, via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"category": "external",
"summary": "RHBZ#2339221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:52.253000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21491",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:03:32.601275+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a hang or frequently repeatable crash, resulting in a complete denial of service via network access through multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"category": "external",
"summary": "RHBZ#2339252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:52.647000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
},
{
"cve": "CVE-2025-21494",
"discovery_date": "2025-01-21T21:05:18.130554+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339277"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows an unauthenticated attacker to cause a hang or frequently repeatable crash via logon to the infrastructure where MySQL Server executes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"category": "external",
"summary": "RHBZ#2339277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:53.805000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability"
},
{
"cve": "CVE-2025-21497",
"discovery_date": "2025-01-21T21:01:05.496242+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339218"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (InnoDB). This vulnerability allows a high privileged attacker to cause a complete Denial of Service (DOS) or unauthorized data modification via network access using multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server (InnoDB): Denial of Service and Data Modification via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"category": "external",
"summary": "RHBZ#2339218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:54.538000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server (InnoDB): Denial of Service and Data Modification via network access"
},
{
"cve": "CVE-2025-21500",
"discovery_date": "2025-01-21T21:06:54.583473+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339300"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"category": "external",
"summary": "RHBZ#2339300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:55.678000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21501",
"discovery_date": "2025-01-21T21:04:52.611944+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339271"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a low privileged attacker to cause a complete Denial of Service (DoS) via network access using multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"category": "external",
"summary": "RHBZ#2339271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:56.037000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability"
},
{
"cve": "CVE-2025-21503",
"discovery_date": "2025-01-21T21:06:16.563221+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339291"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"category": "external",
"summary": "RHBZ#2339291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:56.818000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21504",
"discovery_date": "2025-01-21T21:02:24.819724+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339236"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Optimizer Denial of Service Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21504"
},
{
"category": "external",
"summary": "RHBZ#2339236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:57.195000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Optimizer Denial of Service Vulnerability"
},
{
"cve": "CVE-2025-21505",
"discovery_date": "2025-01-21T21:07:15.257978+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339305"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21505"
},
{
"category": "external",
"summary": "RHBZ#2339305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:57.648000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21518",
"discovery_date": "2025-01-21T21:06:24.968915+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339293"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21518"
},
{
"category": "external",
"summary": "RHBZ#2339293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:03.419000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21519",
"discovery_date": "2025-01-21T21:05:34.782135+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339281"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a high privileged attacker to cause a hang or frequently repeatable crash (complete Denial of Service (DOS)) via network access using multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21519"
},
{
"category": "external",
"summary": "RHBZ#2339281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:03.812000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability via network access"
},
{
"cve": "CVE-2025-21520",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2025-01-21T21:01:15.087444+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339220"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (component: Options). This issue may allow unauthorized read access to a subset of MySQL Server data via a high-privileged attacker with logon to the infrastructure and requires human interaction from another user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server Options Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21520"
},
{
"category": "external",
"summary": "RHBZ#2339220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:04.217000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: MySQL Server Options Vulnerability"
},
{
"cve": "CVE-2025-21521",
"discovery_date": "2025-01-21T21:04:48.403277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339270"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (Thread Pooling component). This vulnerability allows a denial of service (DoS) via network access through multiple protocols by an unauthenticated attacker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of service in Thread Pooling component",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21521"
},
{
"category": "external",
"summary": "RHBZ#2339270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:04.705000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mysql: MySQL Server: Denial of service in Thread Pooling component"
},
{
"cve": "CVE-2025-21522",
"discovery_date": "2025-01-21T21:05:46.684614+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339284"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Parser unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21522"
},
{
"category": "external",
"summary": "RHBZ#2339284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:05.137000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Parser unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21523",
"discovery_date": "2025-01-21T21:07:11.251899+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339304"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21523"
},
{
"category": "external",
"summary": "RHBZ#2339304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:05.511000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21525",
"discovery_date": "2025-01-21T21:04:02.333411+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339259"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a high privileged remote attacker to cause a complete Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability via network access by a high privileged attacker",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21525"
},
{
"category": "external",
"summary": "RHBZ#2339259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:06.259000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability via network access by a high privileged attacker"
},
{
"cve": "CVE-2025-21529",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2025-01-21T21:01:41.718371+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339226"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of service vulnerability via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21529"
},
{
"category": "external",
"summary": "RHBZ#2339226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:07.906000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of service vulnerability via network access"
},
{
"cve": "CVE-2025-21531",
"discovery_date": "2025-01-21T21:02:03.867196+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339231"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service (DoS) via network access by a high privileged attacker",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21531"
},
{
"category": "external",
"summary": "RHBZ#2339231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:08.723000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service (DoS) via network access by a high privileged attacker"
},
{
"cve": "CVE-2025-21534",
"discovery_date": "2025-01-21T21:05:09.810100+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339275"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a high privileged attacker to cause a complete denial of service (DoS) via network access using multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21534"
},
{
"category": "external",
"summary": "RHBZ#2339275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:09.873000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability via network access"
},
{
"cve": "CVE-2025-21536",
"discovery_date": "2025-01-21T21:04:31.799644+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339266"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a high privileged attacker to cause a complete Denial of Service (DoS) via network access through multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of service vulnerability allows high privileged attacker to crash the server via network.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21536"
},
{
"category": "external",
"summary": "RHBZ#2339266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:10.654000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of service vulnerability allows high privileged attacker to crash the server via network."
},
{
"cve": "CVE-2025-21540",
"discovery_date": "2025-01-21T21:02:33.051436+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339238"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Unauthorized Data Modification and Read Access Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21540"
},
{
"category": "external",
"summary": "RHBZ#2339238",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:12.277000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Unauthorized Data Modification and Read Access Vulnerability"
},
{
"cve": "CVE-2025-21543",
"discovery_date": "2025-01-21T21:03:11.756360+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339247"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows unauthorized remote attacker to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21543"
},
{
"category": "external",
"summary": "RHBZ#2339247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:13.601000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service via network access"
},
{
"cve": "CVE-2025-21546",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"discovery_date": "2025-01-21T21:06:50.582476+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339299"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (component: Security: Privileges). This issue can allow unauthorized update, insert, or delete access to MySQL Server data and unauthorized read access to a subset of data via multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Privilege Misuse in MySQL Server Security Component",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21546"
},
{
"category": "external",
"summary": "RHBZ#2339299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:14.687000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Privilege Misuse in MySQL Server Security Component"
},
{
"cve": "CVE-2025-21555",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:02:53.591790+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339243"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs and unauthorized modification, such as updating, inserting, or deleting accessible data via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21555"
},
{
"category": "external",
"summary": "RHBZ#2339243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:18.135000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
},
{
"cve": "CVE-2025-21559",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:06:33.774888+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339295"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, causing frequent crashes or hangs, and unauthorized modification to including updating, inserting, and deleting accessible data via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21559"
},
{
"category": "external",
"summary": "RHBZ#2339295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:19.677000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
}
]
}
RHSA-2024:5625
Vulnerability from csaf_redhat - Published: 2024-08-20 15:55 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* krb5: GSS message token handling (CVE-2024-37370)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5625",
"url": "https://access.redhat.com/errata/RHSA-2024:5625"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5625.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:24+00:00",
"generator": {
"date": "2025-12-09T09:09:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:5625",
"initial_release_date": "2024-08-20T15:55:27+00:00",
"revision_history": [
{
"date": "2024-08-20T15:55:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-20T15:55:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-16.el8_6.1.src",
"product": {
"name": "krb5-0:1.18.2-16.el8_6.1.src",
"product_id": "krb5-0:1.18.2-16.el8_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-16.el8_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-server-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.i686",
"product_id": "libkadm5-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-20T15:55:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5625"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-20T15:55:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5625"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.1.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2024:5312
Vulnerability from csaf_redhat - Published: 2024-08-13 15:32 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* krb5: GSS message token handling (CVE-2024-37370)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5312",
"url": "https://access.redhat.com/errata/RHSA-2024:5312"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5312.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:22+00:00",
"generator": {
"date": "2025-12-09T09:09:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:5312",
"initial_release_date": "2024-08-13T15:32:54+00:00",
"revision_history": [
{
"date": "2024-08-13T15:32:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-13T15:32:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-29.el8_10.src",
"product": {
"name": "krb5-0:1.18.2-29.el8_10.src",
"product_id": "krb5-0:1.18.2-29.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-29.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-devel-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-libs-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-server-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-29.el8_10.aarch64",
"product_id": "libkadm5-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-29.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-29.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-server-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-29.el8_10.ppc64le",
"product_id": "libkadm5-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-29.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-29.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-devel-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-devel-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-libs-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-libs-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-pkinit-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-server-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-server-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-29.el8_10.i686",
"product": {
"name": "libkadm5-0:1.18.2-29.el8_10.i686",
"product_id": "libkadm5-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-debugsource-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-29.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-29.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-devel-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-libs-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-server-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-29.el8_10.x86_64",
"product_id": "libkadm5-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-29.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-29.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-devel-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-libs-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-server-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-server-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-workstation-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "libkadm5-0:1.18.2-29.el8_10.s390x",
"product_id": "libkadm5-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-29.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-29.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-29.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src"
},
"product_reference": "krb5-0:1.18.2-29.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-devel-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-libs-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-server-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-server-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686"
},
"product_reference": "libkadm5-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "libkadm5-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-13T15:32:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5312"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-13T15:32:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5312"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-29.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-29.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-29.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2025:1671
Vulnerability from csaf_redhat - Published: 2025-02-19 10:31 - Updated: 2026-01-08 03:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mysql is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nSecurity Fix(es):\n\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n\n* mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n\n* mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n\n* mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n\n* mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n\n* mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n\n* mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n\n* mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n\n* mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n\n* mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n\n* mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n\n* curl: curl netrc password leak (CVE-2024-11053)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n\n* mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n\n* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n\n* mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n\n* mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n\n* mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n\n* mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n\n* mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n\n* mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n\n* mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:1671",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2301888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
},
{
"category": "external",
"summary": "2318857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
},
{
"category": "external",
"summary": "2318858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
},
{
"category": "external",
"summary": "2318870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
},
{
"category": "external",
"summary": "2318873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
},
{
"category": "external",
"summary": "2318874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
},
{
"category": "external",
"summary": "2318876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
},
{
"category": "external",
"summary": "2318882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
},
{
"category": "external",
"summary": "2318883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
},
{
"category": "external",
"summary": "2318884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
},
{
"category": "external",
"summary": "2318885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
},
{
"category": "external",
"summary": "2318886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
},
{
"category": "external",
"summary": "2318897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
},
{
"category": "external",
"summary": "2318900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
},
{
"category": "external",
"summary": "2318905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
},
{
"category": "external",
"summary": "2318914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
},
{
"category": "external",
"summary": "2318922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
},
{
"category": "external",
"summary": "2318923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
},
{
"category": "external",
"summary": "2318925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
},
{
"category": "external",
"summary": "2318926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
},
{
"category": "external",
"summary": "2318927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
},
{
"category": "external",
"summary": "2331191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
},
{
"category": "external",
"summary": "2339218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
},
{
"category": "external",
"summary": "2339220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
},
{
"category": "external",
"summary": "2339221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
},
{
"category": "external",
"summary": "2339226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
},
{
"category": "external",
"summary": "2339231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
},
{
"category": "external",
"summary": "2339236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
},
{
"category": "external",
"summary": "2339238",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
},
{
"category": "external",
"summary": "2339243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
},
{
"category": "external",
"summary": "2339247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
},
{
"category": "external",
"summary": "2339252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
},
{
"category": "external",
"summary": "2339259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
},
{
"category": "external",
"summary": "2339266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
},
{
"category": "external",
"summary": "2339270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
},
{
"category": "external",
"summary": "2339271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
},
{
"category": "external",
"summary": "2339275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
},
{
"category": "external",
"summary": "2339277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
},
{
"category": "external",
"summary": "2339281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
},
{
"category": "external",
"summary": "2339284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
},
{
"category": "external",
"summary": "2339291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
},
{
"category": "external",
"summary": "2339293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
},
{
"category": "external",
"summary": "2339295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
},
{
"category": "external",
"summary": "2339299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
},
{
"category": "external",
"summary": "2339300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
},
{
"category": "external",
"summary": "2339304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
},
{
"category": "external",
"summary": "2339305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
},
{
"category": "external",
"summary": "RHEL-40867",
"url": "https://issues.redhat.com/browse/RHEL-40867"
},
{
"category": "external",
"summary": "RHEL-5470",
"url": "https://issues.redhat.com/browse/RHEL-5470"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1671.json"
}
],
"title": "Red Hat Security Advisory: mysql security update",
"tracking": {
"current_release_date": "2026-01-08T03:16:55+00:00",
"generator": {
"date": "2026-01-08T03:16:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:1671",
"initial_release_date": "2025-02-19T10:31:41+00:00",
"revision_history": [
{
"date": "2025-02-19T10:31:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-02-19T10:31:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T03:16:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.src",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.src",
"product_id": "mysql-0:8.0.41-2.el9_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-common-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-common-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-server-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-server-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-test-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-test-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294581"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the \u0027no overlap\u0027 response in ALPN or uses the output as the opportunistic protocol in NPN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_select_next_proto buffer overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "RHBZ#2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: SSL_select_next_proto buffer overread"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T04:33:09+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl, where libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: ASN.1 date parser overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is classified as low severity because it primarily results in a heap buffer over-read rather than a direct memory corruption or code execution risk. Since the ASN.1 parsing occurs after a successful TLS handshake, the malformed certificate must first bypass the TLS library\u0027s validation, which significantly reduces the likelihood of exploitation. \n\nAdditionally, the impact is limited to a potential crash or unintended heap data exposure through CURLINFO_CERTINFO, but not arbitrary code execution. The requirement for a specific TLS backend configuration and the controlled nature of the memory read further minimize its exploitability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"category": "external",
"summary": "RHBZ#2301888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\n\nRed Hat build of curl uses OpenSSL, which is not included in the affected list of GnuTLS, Schannel, Secure Transport and mbedTLS. Inspect which TLS backend is in use by running:\n\n$ curl --version\n\nCheck the reference for curl handled by the maintainers which may contain more relevant information around this vulnerability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libcurl: ASN.1 date parser overread"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-12-09T17:25:06.949000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331191"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl netrc password leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects curl when a `.netrc` file is used and a redirect is performed. Additionally, the `.netrc` must match the target hostname but the followed-to host does not have a password or both login and password configured.\n\nExample of a vulnerable .netrc configuration:\n\n~~~\nmachine a.com\n login alice\n password alicespassword\n\ndefault\n login bob\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"category": "external",
"summary": "RHBZ#2331191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "workaround",
"details": "Avoid using the .netrc file together with redirects.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: curl netrc password leak"
},
{
"cve": "CVE-2024-21193",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318923"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: PS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"category": "external",
"summary": "RHBZ#2318923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:35.495000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: PS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21194",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318914"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"category": "external",
"summary": "RHBZ#2318914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:35.850000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21196",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318858"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"category": "external",
"summary": "RHBZ#2318858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:36.816000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21197",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318874"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"category": "external",
"summary": "RHBZ#2318874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.130000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21198",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318925"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DDL unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"category": "external",
"summary": "RHBZ#2318925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.426000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DDL unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21199",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318922"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"category": "external",
"summary": "RHBZ#2318922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.770000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21201",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318882"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"category": "external",
"summary": "RHBZ#2318882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:38.423000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21203",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318885"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: FTS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"category": "external",
"summary": "RHBZ#2318885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:39.267000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: FTS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21212",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318886"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor). Supported versions that are affected are 8.0.39 and prior and 8.4.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"category": "external",
"summary": "RHBZ#2318886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:42.238000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21213",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318905"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"category": "external",
"summary": "RHBZ#2318905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:42.559000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21218",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318876"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"category": "external",
"summary": "RHBZ#2318876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:44.128000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21219",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318897"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DML unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"category": "external",
"summary": "RHBZ#2318897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:44.460000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DML unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21230",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318900"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"category": "external",
"summary": "RHBZ#2318900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:45.238000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21231",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318873"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"category": "external",
"summary": "RHBZ#2318873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:45.633000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21236",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318883"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"category": "external",
"summary": "RHBZ#2318883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.226000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21237",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318884"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"category": "external",
"summary": "RHBZ#2318884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.598000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21238",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318857"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.1 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"category": "external",
"summary": "RHBZ#2318857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.971000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21239",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318927"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"category": "external",
"summary": "RHBZ#2318927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:48.332000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21241",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318870"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"category": "external",
"summary": "RHBZ#2318870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:48.644000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21247",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318926"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"category": "external",
"summary": "RHBZ#2318926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:50.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2025-21490",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the MySQL Server component: InnoDB. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs, via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"category": "external",
"summary": "RHBZ#2339221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:52.253000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21491",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:03:32.601275+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a hang or frequently repeatable crash, resulting in a complete denial of service via network access through multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"category": "external",
"summary": "RHBZ#2339252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:52.647000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
},
{
"cve": "CVE-2025-21494",
"discovery_date": "2025-01-21T21:05:18.130554+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339277"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows an unauthenticated attacker to cause a hang or frequently repeatable crash via logon to the infrastructure where MySQL Server executes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"category": "external",
"summary": "RHBZ#2339277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:53.805000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability"
},
{
"cve": "CVE-2025-21497",
"discovery_date": "2025-01-21T21:01:05.496242+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339218"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (InnoDB). This vulnerability allows a high privileged attacker to cause a complete Denial of Service (DOS) or unauthorized data modification via network access using multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server (InnoDB): Denial of Service and Data Modification via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"category": "external",
"summary": "RHBZ#2339218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:54.538000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server (InnoDB): Denial of Service and Data Modification via network access"
},
{
"cve": "CVE-2025-21500",
"discovery_date": "2025-01-21T21:06:54.583473+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339300"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"category": "external",
"summary": "RHBZ#2339300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:55.678000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21501",
"discovery_date": "2025-01-21T21:04:52.611944+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339271"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a low privileged attacker to cause a complete Denial of Service (DoS) via network access using multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"category": "external",
"summary": "RHBZ#2339271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:56.037000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability"
},
{
"cve": "CVE-2025-21503",
"discovery_date": "2025-01-21T21:06:16.563221+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339291"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"category": "external",
"summary": "RHBZ#2339291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:56.818000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21504",
"discovery_date": "2025-01-21T21:02:24.819724+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339236"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Optimizer Denial of Service Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21504"
},
{
"category": "external",
"summary": "RHBZ#2339236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:57.195000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Optimizer Denial of Service Vulnerability"
},
{
"cve": "CVE-2025-21505",
"discovery_date": "2025-01-21T21:07:15.257978+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339305"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21505"
},
{
"category": "external",
"summary": "RHBZ#2339305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:57.648000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21518",
"discovery_date": "2025-01-21T21:06:24.968915+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339293"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21518"
},
{
"category": "external",
"summary": "RHBZ#2339293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:03.419000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21519",
"discovery_date": "2025-01-21T21:05:34.782135+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339281"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a high privileged attacker to cause a hang or frequently repeatable crash (complete Denial of Service (DOS)) via network access using multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21519"
},
{
"category": "external",
"summary": "RHBZ#2339281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:03.812000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability via network access"
},
{
"cve": "CVE-2025-21520",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2025-01-21T21:01:15.087444+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339220"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (component: Options). This issue may allow unauthorized read access to a subset of MySQL Server data via a high-privileged attacker with logon to the infrastructure and requires human interaction from another user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server Options Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21520"
},
{
"category": "external",
"summary": "RHBZ#2339220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:04.217000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: MySQL Server Options Vulnerability"
},
{
"cve": "CVE-2025-21521",
"discovery_date": "2025-01-21T21:04:48.403277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339270"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (Thread Pooling component). This vulnerability allows a denial of service (DoS) via network access through multiple protocols by an unauthenticated attacker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of service in Thread Pooling component",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21521"
},
{
"category": "external",
"summary": "RHBZ#2339270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:04.705000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mysql: MySQL Server: Denial of service in Thread Pooling component"
},
{
"cve": "CVE-2025-21522",
"discovery_date": "2025-01-21T21:05:46.684614+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339284"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Parser unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21522"
},
{
"category": "external",
"summary": "RHBZ#2339284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:05.137000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Parser unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21523",
"discovery_date": "2025-01-21T21:07:11.251899+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339304"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21523"
},
{
"category": "external",
"summary": "RHBZ#2339304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:05.511000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21525",
"discovery_date": "2025-01-21T21:04:02.333411+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339259"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a high privileged remote attacker to cause a complete Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability via network access by a high privileged attacker",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21525"
},
{
"category": "external",
"summary": "RHBZ#2339259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:06.259000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability via network access by a high privileged attacker"
},
{
"cve": "CVE-2025-21529",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2025-01-21T21:01:41.718371+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339226"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of service vulnerability via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21529"
},
{
"category": "external",
"summary": "RHBZ#2339226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:07.906000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of service vulnerability via network access"
},
{
"cve": "CVE-2025-21531",
"discovery_date": "2025-01-21T21:02:03.867196+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339231"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service (DoS) via network access by a high privileged attacker",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21531"
},
{
"category": "external",
"summary": "RHBZ#2339231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:08.723000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service (DoS) via network access by a high privileged attacker"
},
{
"cve": "CVE-2025-21534",
"discovery_date": "2025-01-21T21:05:09.810100+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339275"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a high privileged attacker to cause a complete denial of service (DoS) via network access using multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service vulnerability via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21534"
},
{
"category": "external",
"summary": "RHBZ#2339275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:09.873000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service vulnerability via network access"
},
{
"cve": "CVE-2025-21536",
"discovery_date": "2025-01-21T21:04:31.799644+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339266"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows a high privileged attacker to cause a complete Denial of Service (DoS) via network access through multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of service vulnerability allows high privileged attacker to crash the server via network.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21536"
},
{
"category": "external",
"summary": "RHBZ#2339266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:10.654000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of service vulnerability allows high privileged attacker to crash the server via network."
},
{
"cve": "CVE-2025-21540",
"discovery_date": "2025-01-21T21:02:33.051436+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339238"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Unauthorized Data Modification and Read Access Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21540"
},
{
"category": "external",
"summary": "RHBZ#2339238",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:12.277000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Unauthorized Data Modification and Read Access Vulnerability"
},
{
"cve": "CVE-2025-21543",
"discovery_date": "2025-01-21T21:03:11.756360+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339247"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server. This vulnerability allows unauthorized remote attacker to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server: Denial of Service via network access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21543"
},
{
"category": "external",
"summary": "RHBZ#2339247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:13.601000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server: Denial of Service via network access"
},
{
"cve": "CVE-2025-21546",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"discovery_date": "2025-01-21T21:06:50.582476+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339299"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (component: Security: Privileges). This issue can allow unauthorized update, insert, or delete access to MySQL Server data and unauthorized read access to a subset of data via multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Privilege Misuse in MySQL Server Security Component",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21546"
},
{
"category": "external",
"summary": "RHBZ#2339299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:14.687000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Privilege Misuse in MySQL Server Security Component"
},
{
"cve": "CVE-2025-21555",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:02:53.591790+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339243"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs and unauthorized modification, such as updating, inserting, or deleting accessible data via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21555"
},
{
"category": "external",
"summary": "RHBZ#2339243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:18.135000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
},
{
"cve": "CVE-2025-21559",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:06:33.774888+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339295"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, causing frequent crashes or hangs, and unauthorized modification to including updating, inserting, and deleting accessible data via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21559"
},
{
"category": "external",
"summary": "RHBZ#2339295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:19.677000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
}
]
}
RHSA-2024:7374
Vulnerability from csaf_redhat - Published: 2024-09-30 14:30 - Updated: 2026-01-04 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated service-interconnect container images are now available for Service Interconnect 1 for RHEL 9.",
"title": "Topic"
},
{
"category": "general",
"text": "Users of service-interconnect rhel9 container images are advised\nto upgrade to these updated images, which contain backported patches to correct security issues and fix bugs. \nUsers of these images are also encouraged to rebuild all container images that depend on these images.\nYou can find images updated by this advisory the in Red Hat Container Catalog",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7374",
"url": "https://access.redhat.com/errata/RHSA-2024:7374"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2270498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270498"
},
{
"category": "external",
"summary": "2279632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279632"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "2297771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297771"
},
{
"category": "external",
"summary": "2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7374.json"
}
],
"title": "Red Hat Security Advisory: Security update for service-interconnect rhel9 container images",
"tracking": {
"current_release_date": "2026-01-04T12:13:45+00:00",
"generator": {
"date": "2026-01-04T12:13:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:7374",
"initial_release_date": "2024-09-30T14:30:36+00:00",
"revision_history": [
{
"date": "2024-09-30T14:30:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-30T14:30:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-04T12:13:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Service Interconnect 1",
"product": {
"name": "Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_interconnect:1::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Service Interconnect"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"product": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"product": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"product": {
"name": "service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"product_id": "service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-operator-bundle\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-5"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"product": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"product": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-5"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"product": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"product": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"product": {
"name": "service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"product_id": "service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-operator-bundle\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-5"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-3"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"product": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"product": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-5"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64"
},
"product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x"
},
"product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64"
},
"product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le"
},
"product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64"
},
"product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x"
},
"product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64"
},
"product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le"
},
"product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64"
},
"product_reference": "service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64"
},
"product_reference": "service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64 as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x as a component of Red Hat Service Interconnect 1",
"product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x",
"relates_to_product_reference": "9Base-Service-Interconnect-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2024-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: HTTP/2 push headers memory-leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2398"
},
{
"category": "external",
"summary": "RHBZ#2270498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2398",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2398"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2024-2398.html",
"url": "https://curl.se/docs/CVE-2024-2398.html"
}
],
"release_date": "2024-03-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-30T14:30:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7374"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: HTTP/2 push headers memory-leak"
},
{
"cve": "CVE-2024-6345",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2024-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297771"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the package_index module of pypa/setuptools. Affected versions of this package allow remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack does not include setuptools. The ImcSdk component uses it only during compile time in our build systems, and we do not support recompiling SRPMs. As a result, Red Hat OpenStack is not affected by this flaw.\n\nPython 2.7.18 was marked End of Life on 04/20/2020. No patches for Python 2 would be made available.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6345"
},
{
"category": "external",
"summary": "RHBZ#2297771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0",
"url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5",
"url": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"
}
],
"release_date": "2024-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-30T14:30:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7374"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-30T14:30:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7374"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
},
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"discovery_date": "2024-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279632"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib2: Signal subscription vulnerabilities",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34397"
},
{
"category": "external",
"summary": "RHBZ#2279632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279632"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/05/07/5",
"url": "https://www.openwall.com/lists/oss-security/2024/05/07/5"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-30T14:30:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7374"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib2: Signal subscription vulnerabilities"
},
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-30T14:30:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7374"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-30T14:30:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7374"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1e51ccc87e6b809e6f510eafaebf9d7b6d9ac02d85d99a21f7c2b3546d95c993_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:1fa92e9dd6c8be900e19a56601239a5cd77c73926f5d1df486541a47fd82d48a_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:450bcad67cd3fb43bb1a1eee5a1b5c2fe30b35e5ee1733d49acaccbbcb3c01df_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:aa3f104a46c7d0a1cdbea484270196933d3d9ba831adf66a82ca9f4d5bf6c1c1_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:2e40acb1ece840bf75b32a7a5a1410ccb510f640f062e42b636efd2da57d8254_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8ec1dd7c77d43c4fd85e34e9b57407616d41b297d207427b7cda3055edacf1fb_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:a267af3a4a7ac8bc1a95ab4668d38b78eb2b6ebb4c435725b28e0139994b1db8_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:b370e625537896ac976aea04fbfc08a1d8f49470ad86bcbf56f911612ace5705_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:5a2bbc2d6ff9877c92bb6f8f9e74b4d398af9a9d0c1c63614ad5221ae0f4387b_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:852c0d2e1fe3aa94340cafb34d3a1f30e5d60a2a13f4e1dcd05a2803fe3b1b94_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:a5d0feb9be612ee20a3aecb144338d34a05a92c0fd85c55f002303ea68a5456f_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:c61deb80251fd029d54f0e1c80e275931b5961e12c69032f53d810ea77ad878b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:1a2e41708c18de011215f3bb4332ec3616cbc7b7122908af1bc83e6b98ea7efd_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:e639c7884894da448456e3a954e0d0e7fc4a70966892b10c8eaa12fdd5cc9d16_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:22ef901809e7f27ab1c0f8d0b16861ccd3aacf88c486a7849cf04be9ec937a34_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:4648a0c7c7f0c24de88e19e4575b61f0642e5f14d4f159adfc29aa02a2838958_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:cd60506a79c19cacf00b4d0ba7b480bd2ac581dd5dd940ea465aa2f26a87b69b_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:e46486ce27952590e7c4ed818c2ec357b90257881104bab09fb481f14124a322_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:09e450f2722b9750e07557885e833b640b38de0674c18d540bbe1d68ad81a429_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:23635d9021733243d00aeb79c67f574efeafad8811d6b5efabd1055f7d70807c_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5a37e9dda65c4dc3c98148ddaeb9d9d0775f135a5bceac2d965df59a6da6195e_s390x",
"9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5ef5bb44d5b145edbab3251df66759b1b5ba7759df2393a695afe7499b496ac0_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:85cfc600b04354394bca458cd2e28c41355c71287e09ed800a1259d8c3d286d2_ppc64le",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:89b500b2f4b4a120fb3a408782759d3200702a61448c3d588663a2acd4259498_amd64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:c7de1b3a39ae8e4ea095b40fa697ac8678eb5903aff605e854b9bda36f9d1693_arm64",
"9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:ee72aa47a10c33b3e20022ebc2f9dab4e000d195363cd702fb67f7c7c298759f_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2024:5316
Vulnerability from csaf_redhat - Published: 2024-08-13 15:43 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* krb5: GSS message token handling (CVE-2024-37370)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5316",
"url": "https://access.redhat.com/errata/RHSA-2024:5316"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5316.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:24+00:00",
"generator": {
"date": "2025-12-09T09:09:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:5316",
"initial_release_date": "2024-08-13T15:43:49+00:00",
"revision_history": [
{
"date": "2024-08-13T15:43:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-13T15:43:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.15.1-37.el7_7.4.src",
"product": {
"name": "krb5-0:1.15.1-37.el7_7.4.src",
"product_id": "krb5-0:1.15.1-37.el7_7.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.15.1-37.el7_7.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"product": {
"name": "krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"product_id": "krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-37.el7_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"product": {
"name": "krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"product_id": "krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-37.el7_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"product": {
"name": "krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"product_id": "krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-37.el7_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"product": {
"name": "krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"product_id": "krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-37.el7_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"product_id": "krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-37.el7_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"product": {
"name": "krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"product_id": "krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-37.el7_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-37.el7_7.4.x86_64",
"product": {
"name": "libkadm5-0:1.15.1-37.el7_7.4.x86_64",
"product_id": "libkadm5-0:1.15.1-37.el7_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-37.el7_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"product_id": "krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-37.el7_7.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-37.el7_7.4.i686",
"product": {
"name": "krb5-devel-0:1.15.1-37.el7_7.4.i686",
"product_id": "krb5-devel-0:1.15.1-37.el7_7.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-37.el7_7.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-37.el7_7.4.i686",
"product": {
"name": "krb5-libs-0:1.15.1-37.el7_7.4.i686",
"product_id": "krb5-libs-0:1.15.1-37.el7_7.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-37.el7_7.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-37.el7_7.4.i686",
"product": {
"name": "libkadm5-0:1.15.1-37.el7_7.4.i686",
"product_id": "libkadm5-0:1.15.1-37.el7_7.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-37.el7_7.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"product": {
"name": "krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"product_id": "krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-37.el7_7.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.15.1-37.el7_7.4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src"
},
"product_reference": "krb5-0:1.15.1-37.el7_7.4.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-37.el7_7.4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686"
},
"product_reference": "krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-37.el7_7.4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686"
},
"product_reference": "krb5-devel-0:1.15.1-37.el7_7.4.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-37.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64"
},
"product_reference": "krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-37.el7_7.4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686"
},
"product_reference": "krb5-libs-0:1.15.1-37.el7_7.4.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-37.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64"
},
"product_reference": "krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64"
},
"product_reference": "krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-37.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64"
},
"product_reference": "krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-37.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64"
},
"product_reference": "krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-37.el7_7.4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686"
},
"product_reference": "libkadm5-0:1.15.1-37.el7_7.4.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-37.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
},
"product_reference": "libkadm5-0:1.15.1-37.el7_7.4.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-13T15:43:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-13T15:43:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:krb5-0:1.15.1-37.el7_7.4.src",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-debuginfo-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-devel-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:krb5-libs-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-pkinit-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-server-ldap-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:krb5-workstation-0:1.15.1-37.el7_7.4.x86_64",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.i686",
"7Server-7.7.AUS:libkadm5-0:1.15.1-37.el7_7.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHBA-2024:6585
Vulnerability from csaf_redhat - Published: 2024-09-11 11:29 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated rhel9/toolbox container image is now available in the Red Hat container registry.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhel9/toolbox container image can be used with Toolbox to obtain RHEL based containerized command line environments to aid with development and software testing. Toolbox is built on top of Podman and other standard container technologies from OCI.\n\nThis updates the rhel9/toolbox image in the Red Hat container registry.\n\nTo pull this container image, run one of the following commands:\n\npodman pull registry.redhat.io/rhel9/toolbox (authenticated)\npodman pull registry.access.redhat.com/ubi9/toolbox (unauthenticated)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2024:6585",
"url": "https://access.redhat.com/errata/RHBA-2024:6585"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/software/containers/search",
"url": "https://catalog.redhat.com/software/containers/search"
},
{
"category": "external",
"summary": "2293942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293942"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhba-2024_6585.json"
}
],
"title": "Red Hat Bug Fix Advisory: Updated rhel9/toolbox container image",
"tracking": {
"current_release_date": "2025-12-09T09:09:21+00:00",
"generator": {
"date": "2025-12-09T09:09:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHBA-2024:6585",
"initial_release_date": "2024-09-11T11:29:42+00:00",
"revision_history": [
{
"date": "2024-09-11T11:29:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-11T11:29:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"product": {
"name": "rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"product_id": "rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341?arch=ppc64le\u0026repository_url=registry.redhat.io/rhel9/toolbox\u0026tag=9.4-12.1725906880"
}
}
},
{
"category": "product_version",
"name": "ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"product": {
"name": "ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"product_id": "ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341?arch=ppc64le\u0026repository_url=registry.redhat.io/ubi9/toolbox\u0026tag=9.4-12.1725906880"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"product": {
"name": "rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"product_id": "rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"product_identification_helper": {
"purl": "pkg:oci/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956?arch=arm64\u0026repository_url=registry.redhat.io/rhel9/toolbox\u0026tag=9.4-12.1725906880"
}
}
},
{
"category": "product_version",
"name": "ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"product": {
"name": "ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"product_id": "ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"product_identification_helper": {
"purl": "pkg:oci/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956?arch=arm64\u0026repository_url=registry.redhat.io/ubi9/toolbox\u0026tag=9.4-12.1725906880"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"product": {
"name": "rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"product_id": "rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"product_identification_helper": {
"purl": "pkg:oci/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420?arch=s390x\u0026repository_url=registry.redhat.io/rhel9/toolbox\u0026tag=9.4-12.1725906880"
}
}
},
{
"category": "product_version",
"name": "ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"product": {
"name": "ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"product_id": "ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"product_identification_helper": {
"purl": "pkg:oci/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420?arch=s390x\u0026repository_url=registry.redhat.io/ubi9/toolbox\u0026tag=9.4-12.1725906880"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"product": {
"name": "rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"product_id": "rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e?arch=amd64\u0026repository_url=registry.redhat.io/rhel9/toolbox\u0026tag=9.4-12.1725906880"
}
}
},
{
"category": "product_version",
"name": "ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"product": {
"name": "ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"product_id": "ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e?arch=amd64\u0026repository_url=registry.redhat.io/ubi9/toolbox\u0026tag=9.4-12.1725906880"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64"
},
"product_reference": "rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le"
},
"product_reference": "rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x"
},
"product_reference": "rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
},
"product_reference": "rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64"
},
"product_reference": "ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le"
},
"product_reference": "ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x"
},
"product_reference": "ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
},
"product_reference": "ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"discovery_date": "2024-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279632"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib2: Signal subscription vulnerabilities",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34397"
},
{
"category": "external",
"summary": "RHBZ#2279632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279632"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/05/07/5",
"url": "https://www.openwall.com/lists/oss-security/2024/05/07/5"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-11T11:29:42+00:00",
"details": "The container image provided by this update can be downloaded from the Red Hat container registry at registry.redhat.io or registry.access.redhat.com using the \"podman pull\" command.\n\nFor more information about the image, search the \u003cimage_name\u003e in the Red Hat Ecosystem Catalog: https://catalog.redhat.com/software/containers/search.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2024:6585"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib2: Signal subscription vulnerabilities"
},
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-11T11:29:42+00:00",
"details": "The container image provided by this update can be downloaded from the Red Hat container registry at registry.redhat.io or registry.access.redhat.com using the \"podman pull\" command.\n\nFor more information about the image, search the \u003cimage_name\u003e in the Red Hat Ecosystem Catalog: https://catalog.redhat.com/software/containers/search.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2024:6585"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-11T11:29:42+00:00",
"details": "The container image provided by this update can be downloaded from the Red Hat container registry at registry.redhat.io or registry.access.redhat.com using the \"podman pull\" command.\n\nFor more information about the image, search the \u003cimage_name\u003e in the Red Hat Ecosystem Catalog: https://catalog.redhat.com/software/containers/search.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2024:6585"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:rhel9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:18941856982108e0829cd1d35c033c02bdb558300bf43248f31ef035d6ae883e_amd64",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:b01977589a75d25f04d94daf5c0f27f18280691b89ddc92441454f2cc4f54341_ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:c7ea1da5e59a03a7ce0905600fecaadc121c0430cd62cf47cb34a53d7db84420_s390x",
"AppStream-9.4.0.Z.MAIN.EUS:ubi9/toolbox@sha256:fa82c8a67af71b7f5bdfdbe430d4216fd11d8e710512b5bedfdb47e5f5a04956_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2024:5076
Vulnerability from csaf_redhat - Published: 2024-08-07 10:22 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5076",
"url": "https://access.redhat.com/errata/RHSA-2024:5076"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5076.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:22+00:00",
"generator": {
"date": "2025-12-09T09:09:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:5076",
"initial_release_date": "2024-08-07T10:22:33+00:00",
"revision_history": [
{
"date": "2024-08-07T10:22:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-07T10:22:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.15.1-55.el7_9.2.src",
"product": {
"name": "krb5-0:1.15.1-55.el7_9.2.src",
"product_id": "krb5-0:1.15.1-55.el7_9.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.15.1-55.el7_9.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.2.i686",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.i686",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.2.i686",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.i686",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.2.i686",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.i686",
"product_id": "libkadm5-0:1.15.1-55.el7_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"product_id": "krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.2.x86_64",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.x86_64",
"product_id": "libkadm5-0:1.15.1-55.el7_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc",
"product_id": "libkadm5-0:1.15.1-55.el7_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"product_id": "krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"product_id": "libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"product_id": "krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"product_id": "libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.2.s390",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.s390",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.2.s390",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.s390",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.2.s390",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.s390",
"product_id": "libkadm5-0:1.15.1-55.el7_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.2.s390x",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.2.s390x",
"product_id": "krb5-server-0:1.15.1-55.el7_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.2.s390x",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.s390x",
"product_id": "libkadm5-0:1.15.1-55.el7_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.15.1-55.el7_9.2.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src"
},
"product_reference": "krb5-0:1.15.1-55.el7_9.2.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.2.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.2.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.2.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.2.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.2.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.2.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.2.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.2.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.2.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.2.x86_64",
"relates_to_product_reference": "7Server-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T10:22:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5076"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T10:22:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5076"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.2.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.2.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2024:7213
Vulnerability from csaf_redhat - Published: 2024-09-26 13:26 - Updated: 2026-01-04 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated service-interconnect container images are now available for Service Interconnect 1.4 LTS for RHEL 9.",
"title": "Topic"
},
{
"category": "general",
"text": "Users of service-interconnect 1.4 LTS rhel9 container images are advised\nto upgrade to these updated images, which contain backported patches to correct security issues and fix bugs. \nUsers of these images are also encouraged to rebuild all container images that depend on these images.\nYou can find images updated by this advisory the in Red Hat Container Catalog",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7213",
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2270498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270498"
},
{
"category": "external",
"summary": "2279632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279632"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "2297771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297771"
},
{
"category": "external",
"summary": "2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7213.json"
}
],
"title": "Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.4 LTS",
"tracking": {
"current_release_date": "2026-01-04T12:13:44+00:00",
"generator": {
"date": "2026-01-04T12:13:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:7213",
"initial_release_date": "2024-09-26T13:26:32+00:00",
"revision_history": [
{
"date": "2024-09-26T13:26:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-26T13:26:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-04T12:13:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "9Base-Service-Interconnect-1.4",
"product": {
"name": "9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_interconnect:1.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Service Interconnect"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.4.7-2"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.4.7-2"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"product": {
"name": "service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"product_id": "service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-operator-bundle\u0026tag=1.4.7-2"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.4.3-6"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.4.7-2"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.4.7-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64"
},
"product_reference": "service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2024-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: HTTP/2 push headers memory-leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2398"
},
{
"category": "external",
"summary": "RHBZ#2270498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2398",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2398"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2024-2398.html",
"url": "https://curl.se/docs/CVE-2024-2398.html"
}
],
"release_date": "2024-03-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: HTTP/2 push headers memory-leak"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-08-20T17:50:04+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2306158"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Possible denial of service in X.509 name checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because it primarily affects specific use cases involving certificate name checks against otherName subject alternative names, a scenario that is not commonly encountered. The issue only triggers a denial of service (DoS) by causing an abnormal application termination, without compromising the integrity, confidentiality, or availability of data at a broader scale. Additionally, TLS servers, which typically don\u0027t perform reference identity checks during client certificate validation, are largely unaffected. The impact is localized to certain TLS clients performing specific name comparisons, reducing the overall risk profile and justifying the moderate severity classification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6119"
},
{
"category": "external",
"summary": "RHBZ#2306158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2306158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6119",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6119"
},
{
"category": "external",
"summary": "https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj",
"url": "https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj"
}
],
"release_date": "2024-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Possible denial of service in X.509 name checks"
},
{
"cve": "CVE-2024-6345",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2024-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297771"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the package_index module of pypa/setuptools. Affected versions of this package allow remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack does not include setuptools. The ImcSdk component uses it only during compile time in our build systems, and we do not support recompiling SRPMs. As a result, Red Hat OpenStack is not affected by this flaw.\n\nPython 2.7.18 was marked End of Life on 04/20/2020. No patches for Python 2 would be made available.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6345"
},
{
"category": "external",
"summary": "RHBZ#2297771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0",
"url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5",
"url": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"
}
],
"release_date": "2024-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
},
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"discovery_date": "2024-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279632"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib2: Signal subscription vulnerabilities",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34397"
},
{
"category": "external",
"summary": "RHBZ#2279632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279632"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/05/07/5",
"url": "https://www.openwall.com/lists/oss-security/2024/05/07/5"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib2: Signal subscription vulnerabilities"
},
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2024-08-30T03:20:06.675968+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308615"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libexpat\u0027s xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: Negative Length Parsing Vulnerability in libexpat",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-45490 vulnerability is rated as moderate severity because while it allows for memory corruption through improper argument handling in XML_ParseBuffer, the exploitability is limited. Specifically, it requires an unlikely scenario where the input passed to the function has a negative length (len \u003c 0), which would typically not occur in well-formed applications. Moreover, while the impact includes denial of service (DoS), the conditions necessary for arbitrary code execution are non-trivial, requiring specific exploitation of memory corruption. Since it primarily leads to application crashes without an easily accessible attack vector for remote code execution, the risk is lower compared to higher-severity vulnerabilities that offer more direct pathways to exploitation.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow or Wraparound vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations and configuration controls enforce secure system and software settings, while least functionality reduces the attack surface by disabling unnecessary services and ports. In the event of successful exploitation, process isolation ensures that memory corruption is contained within the originating process, preventing it from affecting other processes or the system as a whole. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions. These controls help detect and prevent malicious code that attempts to exploit integer overflow vulnerabilities through mechanisms like file integrity checks and patch management. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are used to enhance resilience against integer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45490"
},
{
"category": "external",
"summary": "RHBZ#2308615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45490"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/887",
"url": "https://github.com/libexpat/libexpat/issues/887"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/890",
"url": "https://github.com/libexpat/libexpat/pull/890"
}
],
"release_date": "2024-08-30T03:15:03.757000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: Negative Length Parsing Vulnerability in libexpat"
},
{
"cve": "CVE-2024-45491",
"discovery_date": "2024-08-30T03:20:09.474759+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308616"
}
],
"notes": [
{
"category": "description",
"text": "An issue was found in libexpat\u2019s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: Integer Overflow or Wraparound",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as Moderate severity rather than Important due to its reliance on specific conditions for exploitation. The integer overflow in dtdCopy affecting nDefaultAtts is limited to 32-bit platforms, reducing the attack surface as many modern systems operate on 64-bit architectures. Additionally, while the impact can lead to denial of service and potentially arbitrary code execution, the latter requires precise manipulation of the overflow condition, which may be non-trivial for attackers to achieve reliably. The constrained platform scope and the complexity of exploitation lower the overall severity, though it still poses a risk in environments where 32-bit systems are prevalent.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45491"
},
{
"category": "external",
"summary": "RHBZ#2308616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308616"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45491"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/888",
"url": "https://github.com/libexpat/libexpat/issues/888"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/891",
"url": "https://github.com/libexpat/libexpat/pull/891"
}
],
"release_date": "2024-08-30T03:15:03.850000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: Integer Overflow or Wraparound"
},
{
"cve": "CVE-2024-45492",
"discovery_date": "2024-08-30T03:20:11.638476+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308617"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libexpat\u0027s internal nextScaffoldPart function in xmlparse.c. It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: integer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "CVE-2024-45492 is categorized as a Moderate severity issue rather than Important due to the specific conditions required for exploitation and the limited scope of impact. While an integer overflow in the nextScaffoldPart function on 32-bit platforms can potentially lead to denial of service (DoS) or, in rare cases, arbitrary code execution, the vulnerability is platform-specific, affecting only 32-bit architectures with particular handling of UINT_MAX and SIZE_MAX. Additionally, exploiting the overflow for arbitrary code execution would require precise manipulation of memory, making it a less likely attack vector. The primary risk of DoS, without guaranteed escalation to remote code execution, further justifies the moderate severity classification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45492"
},
{
"category": "external",
"summary": "RHBZ#2308617",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308617"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45492"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/889",
"url": "https://github.com/libexpat/libexpat/issues/889"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/892",
"url": "https://github.com/libexpat/libexpat/pull/892"
}
],
"release_date": "2024-08-30T03:15:03.930000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T13:26:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:025f8c5b4ea63567a49b79945932e877f2279bc149c832283226a8488590ab37_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:c338911564f18192114799711b16bc3015da0f53cbc9eb44418b6d1e78864bf9_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:b6d7798d7fdfd40662f0d479efe7eb35414cbbd3643ea02cd05c71aeea020ffb_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:0f7be97ca4fabb79ff77557429f0d08118eb5afc4e7322361493d322ae57cd08_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:2da6dba7b2c9a47d0eedd7915a470d1a4e435848962ba39c72b8ea0d2bc9c1d8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:04dd17efae41b6d7e07fd89b8eddca076dfea7cb4e603a83c5c4e27062ef4c90_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: integer overflow"
}
]
}
RHSA-2024:5884
Vulnerability from csaf_redhat - Published: 2024-08-27 07:45 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* krb5: GSS message token handling (CVE-2024-37370)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5884",
"url": "https://access.redhat.com/errata/RHSA-2024:5884"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5884.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:26+00:00",
"generator": {
"date": "2025-12-09T09:09:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:5884",
"initial_release_date": "2024-08-27T07:45:15+00:00",
"revision_history": [
{
"date": "2024-08-27T07:45:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-27T07:45:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.17-19.el8_2.1.src",
"product": {
"name": "krb5-0:1.17-19.el8_2.1.src",
"product_id": "krb5-0:1.17-19.el8_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.17-19.el8_2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-devel-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-devel-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-libs-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-libs-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-pkinit-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-pkinit-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-server-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-server-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.17-19.el8_2.1.i686",
"product": {
"name": "libkadm5-0:1.17-19.el8_2.1.i686",
"product_id": "libkadm5-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-debugsource-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-debugsource-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-devel-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-devel-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-libs-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-libs-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-server-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-server-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "libkadm5-0:1.17-19.el8_2.1.x86_64",
"product_id": "libkadm5-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.17-19.el8_2.1.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src"
},
"product_reference": "krb5-0:1.17-19.el8_2.1.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-debugsource-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-devel-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-devel-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-libs-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-libs-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-pkinit-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-server-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-server-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686"
},
"product_reference": "libkadm5-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "libkadm5-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-27T07:45:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5884"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-27T07:45:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5884"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2024:10135
Vulnerability from csaf_redhat - Published: 2024-11-21 09:03 - Updated: 2026-01-04 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated service-interconnect container images are now available for Service Interconnect 1.4 LTS for RHEL 9.",
"title": "Topic"
},
{
"category": "general",
"text": "Users of service-interconnect 1.4 LTS rhel9 container images are advised\nto upgrade to these updated images, which contain backported patches to correct security issues and fix bugs. \nUsers of these images are also encouraged to rebuild all container images that depend on these images.\nYou can find images updated by this advisory the in Red Hat Container Catalog",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:10135",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "2321987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2321987"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10135.json"
}
],
"title": "Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.4 LTS",
"tracking": {
"current_release_date": "2026-01-04T12:13:31+00:00",
"generator": {
"date": "2026-01-04T12:13:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:10135",
"initial_release_date": "2024-11-21T09:03:29+00:00",
"revision_history": [
{
"date": "2024-11-21T09:03:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-21T09:03:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-04T12:13:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "9Base-Service-Interconnect-1.4",
"product": {
"name": "9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_interconnect:1.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Service Interconnect"
},
{
"branches": [
{
"category": "product_version",
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"product": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.4.7-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"product": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.4.7-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"product": {
"name": "service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"product_id": "service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-operator-bundle\u0026tag=1.4.7-4"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"product": {
"name": "service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"product_id": "service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.4.3-7"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"product": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.4.7-3"
}
}
},
{
"category": "product_version",
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64",
"product": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64",
"product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.4.7-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64"
},
"product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64"
},
"product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64"
},
"product_reference": "service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64"
},
"product_reference": "service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64"
},
"product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64 as a component of 9Base-Service-Interconnect-1.4",
"product_id": "9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
},
"product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64",
"relates_to_product_reference": "9Base-Service-Interconnect-1.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2024-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an application configures libcurl to use HTTP/2 server push and the amount of received headers for the push surpasses the maximum allowed limit, libcurl aborts the server push. When aborting, libcurl does not free all the previously allocated headers, resulting in a memory leak.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: HTTP/2 push headers memory-leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-2398"
},
{
"category": "external",
"summary": "RHBZ#2270498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-2398",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2398"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2024-2398.html",
"url": "https://curl.se/docs/CVE-2024-2398.html"
}
],
"release_date": "2024-03-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: HTTP/2 push headers memory-leak"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-08-20T17:50:04+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2306158"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Possible denial of service in X.509 name checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because it primarily affects specific use cases involving certificate name checks against otherName subject alternative names, a scenario that is not commonly encountered. The issue only triggers a denial of service (DoS) by causing an abnormal application termination, without compromising the integrity, confidentiality, or availability of data at a broader scale. Additionally, TLS servers, which typically don\u0027t perform reference identity checks during client certificate validation, are largely unaffected. The impact is localized to certain TLS clients performing specific name comparisons, reducing the overall risk profile and justifying the moderate severity classification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6119"
},
{
"category": "external",
"summary": "RHBZ#2306158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2306158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6119",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6119"
},
{
"category": "external",
"summary": "https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj",
"url": "https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj"
}
],
"release_date": "2024-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Possible denial of service in X.509 name checks"
},
{
"cve": "CVE-2024-6345",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2024-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297771"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the package_index module of pypa/setuptools. Affected versions of this package allow remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack does not include setuptools. The ImcSdk component uses it only during compile time in our build systems, and we do not support recompiling SRPMs. As a result, Red Hat OpenStack is not affected by this flaw.\n\nPython 2.7.18 was marked End of Life on 04/20/2020. No patches for Python 2 would be made available.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6345"
},
{
"category": "external",
"summary": "RHBZ#2297771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0",
"url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5",
"url": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"
}
],
"release_date": "2024-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
},
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"discovery_date": "2024-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279632"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GNOME GLib. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This issue could lead to the GDBus-based client behaving incorrectly with an application-dependent impact.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib2: Signal subscription vulnerabilities",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34397"
},
{
"category": "external",
"summary": "RHBZ#2279632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279632"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34397"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/05/07/5",
"url": "https://www.openwall.com/lists/oss-security/2024/05/07/5"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib2: Signal subscription vulnerabilities"
},
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2024-08-30T03:20:06.675968+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308615"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libexpat\u0027s xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: Negative Length Parsing Vulnerability in libexpat",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-45490 vulnerability is rated as moderate severity because while it allows for memory corruption through improper argument handling in XML_ParseBuffer, the exploitability is limited. Specifically, it requires an unlikely scenario where the input passed to the function has a negative length (len \u003c 0), which would typically not occur in well-formed applications. Moreover, while the impact includes denial of service (DoS), the conditions necessary for arbitrary code execution are non-trivial, requiring specific exploitation of memory corruption. Since it primarily leads to application crashes without an easily accessible attack vector for remote code execution, the risk is lower compared to higher-severity vulnerabilities that offer more direct pathways to exploitation.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow or Wraparound vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations and configuration controls enforce secure system and software settings, while least functionality reduces the attack surface by disabling unnecessary services and ports. In the event of successful exploitation, process isolation ensures that memory corruption is contained within the originating process, preventing it from affecting other processes or the system as a whole. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions. These controls help detect and prevent malicious code that attempts to exploit integer overflow vulnerabilities through mechanisms like file integrity checks and patch management. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are used to enhance resilience against integer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45490"
},
{
"category": "external",
"summary": "RHBZ#2308615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45490"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/887",
"url": "https://github.com/libexpat/libexpat/issues/887"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/890",
"url": "https://github.com/libexpat/libexpat/pull/890"
}
],
"release_date": "2024-08-30T03:15:03.757000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: Negative Length Parsing Vulnerability in libexpat"
},
{
"cve": "CVE-2024-45491",
"discovery_date": "2024-08-30T03:20:09.474759+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308616"
}
],
"notes": [
{
"category": "description",
"text": "An issue was found in libexpat\u2019s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: Integer Overflow or Wraparound",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as Moderate severity rather than Important due to its reliance on specific conditions for exploitation. The integer overflow in dtdCopy affecting nDefaultAtts is limited to 32-bit platforms, reducing the attack surface as many modern systems operate on 64-bit architectures. Additionally, while the impact can lead to denial of service and potentially arbitrary code execution, the latter requires precise manipulation of the overflow condition, which may be non-trivial for attackers to achieve reliably. The constrained platform scope and the complexity of exploitation lower the overall severity, though it still poses a risk in environments where 32-bit systems are prevalent.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45491"
},
{
"category": "external",
"summary": "RHBZ#2308616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308616"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45491"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/888",
"url": "https://github.com/libexpat/libexpat/issues/888"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/891",
"url": "https://github.com/libexpat/libexpat/pull/891"
}
],
"release_date": "2024-08-30T03:15:03.850000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: Integer Overflow or Wraparound"
},
{
"cve": "CVE-2024-45492",
"discovery_date": "2024-08-30T03:20:11.638476+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308617"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libexpat\u0027s internal nextScaffoldPart function in xmlparse.c. It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: integer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "CVE-2024-45492 is categorized as a Moderate severity issue rather than Important due to the specific conditions required for exploitation and the limited scope of impact. While an integer overflow in the nextScaffoldPart function on 32-bit platforms can potentially lead to denial of service (DoS) or, in rare cases, arbitrary code execution, the vulnerability is platform-specific, affecting only 32-bit architectures with particular handling of UINT_MAX and SIZE_MAX. Additionally, exploiting the overflow for arbitrary code execution would require precise manipulation of memory, making it a less likely attack vector. The primary risk of DoS, without guaranteed escalation to remote code execution, further justifies the moderate severity classification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45492"
},
{
"category": "external",
"summary": "RHBZ#2308617",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308617"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45492"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/889",
"url": "https://github.com/libexpat/libexpat/issues/889"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/892",
"url": "https://github.com/libexpat/libexpat/pull/892"
}
],
"release_date": "2024-08-30T03:15:03.930000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-21T09:03:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-config-sync-rhel9@sha256:51c106e22bc98c6678dafc2f42e387f6e6158e686436e6f89747703dd9c1bbbc_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-flow-collector-rhel9@sha256:58ec0e5cb8a9544153410867797e40055928dbd589e652e02bf4cddff083f5f6_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-operator-bundle@sha256:32c03556f3eb7f87c0624b105e8d9aac7dcfaea71adf16e4e9825586829880c1_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-router-rhel9@sha256:958ec2e1c85c49252d7b49a7b0073a0e73dffac31e46bad2b0a788114cb13c74_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-service-controller-rhel9@sha256:34ce86c11588f0c7b2ba40ff988a8b6ac7ae6d29182e94d3a65e5756c68578f8_amd64",
"9Base-Service-Interconnect-1.4:service-interconnect/skupper-site-controller-rhel9@sha256:cce081bb2d5ae131770dfd095c2e8ad2fcc616d9b3fc487f9252c8f721f1b2ba_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: integer overflow"
}
]
}
RHSA-2024:4734
Vulnerability from csaf_redhat - Published: 2024-07-23 14:59 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37370)\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4734",
"url": "https://access.redhat.com/errata/RHSA-2024:4734"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4734.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:18+00:00",
"generator": {
"date": "2025-12-09T09:09:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:4734",
"initial_release_date": "2024-07-23T14:59:08+00:00",
"revision_history": [
{
"date": "2024-07-23T14:59:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-23T14:59:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-9.el8_4.1.src",
"product": {
"name": "krb5-0:1.18.2-9.el8_4.1.src",
"product_id": "krb5-0:1.18.2-9.el8_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-9.el8_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-server-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.i686",
"product_id": "libkadm5-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.1.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.1.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.1.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.1.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.1.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T14:59:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4734"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-23T14:59:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4734"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.1.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.1.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2024:5630
Vulnerability from csaf_redhat - Published: 2024-08-20 15:50 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5630",
"url": "https://access.redhat.com/errata/RHSA-2024:5630"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5630.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:24+00:00",
"generator": {
"date": "2025-12-09T09:09:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:5630",
"initial_release_date": "2024-08-20T15:50:15+00:00",
"revision_history": [
{
"date": "2024-08-20T15:50:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-20T15:50:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.19.1-16.el9_0.1.src",
"product": {
"name": "krb5-0:1.19.1-16.el9_0.1.src",
"product_id": "krb5-0:1.19.1-16.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.19.1-16.el9_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-server-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.i686",
"product_id": "libkadm5-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.1.i686",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.i686",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-server-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.s390x",
"product_id": "libkadm5-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.19.1-16.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src"
},
"product_reference": "krb5-0:1.19.1-16.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.19.1-16.el9_0.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src"
},
"product_reference": "krb5-0:1.19.1-16.el9_0.1.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-20T15:50:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5630"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-20T15:50:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5630"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
RHSA-2024:5643
Vulnerability from csaf_redhat - Published: 2024-08-20 16:13 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* krb5: GSS message token handling (CVE-2024-37370)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5643",
"url": "https://access.redhat.com/errata/RHSA-2024:5643"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5643.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:25+00:00",
"generator": {
"date": "2025-12-09T09:09:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:5643",
"initial_release_date": "2024-08-20T16:13:33+00:00",
"revision_history": [
{
"date": "2024-08-20T16:13:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-20T16:13:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-server-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.i686",
"product_id": "libkadm5-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-server-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.s390x",
"product_id": "libkadm5-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.20.1-9.el9_2.1.src",
"product": {
"name": "krb5-0:1.20.1-9.el9_2.1.src",
"product_id": "krb5-0:1.20.1-9.el9_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.20.1-9.el9_2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.20.1-9.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src"
},
"product_reference": "krb5-0:1.20.1-9.el9_2.1.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.20.1-9.el9_2.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src"
},
"product_reference": "krb5-0:1.20.1-9.el9_2.1.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294677"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an ability to disrupt authentication process and attackers able to alter the token data durning the transmission which leads to disruption in service and an attacker can void the integrity by altering the token durning the transmission for authentication process. This has been rated as moderate by Redhat as the vulnerability cannot be exploited in a way that it leads to a loss of availability or integrity,when in transmission token count field can be changed making the token appear truncated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "RHBZ#2294677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37370"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-20T16:13:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5643"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-20T16:13:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5643"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.1.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
}
]
}
WID-SEC-W-2025-0148
Vulnerability from csaf_certbund - Published: 2025-01-21 23:00 - Updated: 2025-01-21 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0148 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0148.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0148 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0148"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - January 2025 - Appendix Oracle Communications vom 2025-01-21",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixCGBU"
}
],
"source_lang": "en-US",
"title": "Oracle Communications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-21T23:00:00.000+00:00",
"generator": {
"date": "2025-01-22T09:43:54.832+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2025-0148",
"initial_release_date": "2025-01-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Oracle Communications 9.0",
"product_id": "T018954",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.0"
}
}
},
{
"category": "product_version",
"name": "5.1",
"product": {
"name": "Oracle Communications 5.1",
"product_id": "T028684",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.1"
}
}
},
{
"category": "product_version",
"name": "15.0.0.0.0",
"product": {
"name": "Oracle Communications 15.0.0.0.0",
"product_id": "T032090",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:15.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "23.4.0",
"product": {
"name": "Oracle Communications 23.4.0",
"product_id": "T032091",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.0"
}
}
},
{
"category": "product_version",
"name": "24.1.0",
"product": {
"name": "Oracle Communications 24.1.0",
"product_id": "T034145",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.0"
}
}
},
{
"category": "product_version",
"name": "5.2",
"product": {
"name": "Oracle Communications 5.2",
"product_id": "T034146",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.2"
}
}
},
{
"category": "product_version",
"name": "23.4.4",
"product": {
"name": "Oracle Communications 23.4.4",
"product_id": "T036196",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.4"
}
}
},
{
"category": "product_version",
"name": "24.2.0",
"product": {
"name": "Oracle Communications 24.2.0",
"product_id": "T036197",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.0"
}
}
},
{
"category": "product_version",
"name": "4.1.0",
"product": {
"name": "Oracle Communications 4.1.0",
"product_id": "T036205",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.1.0"
}
}
},
{
"category": "product_version",
"name": "4.2.0",
"product": {
"name": "Oracle Communications 4.2.0",
"product_id": "T036206",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.2.0"
}
}
},
{
"category": "product_version",
"name": "9.2.0",
"product": {
"name": "Oracle Communications 9.2.0",
"product_id": "T036207",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.2.0"
}
}
},
{
"category": "product_version",
"name": "9.3.0",
"product": {
"name": "Oracle Communications 9.3.0",
"product_id": "T036208",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.3.0"
}
}
},
{
"category": "product_version",
"name": "24.2.1",
"product": {
"name": "Oracle Communications 24.2.1",
"product_id": "T038376",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.1"
}
}
},
{
"category": "product_version",
"name": "24.1.1",
"product": {
"name": "Oracle Communications 24.1.1",
"product_id": "T038378",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.2",
"product": {
"name": "Oracle Communications \u003c=24.2.2",
"product_id": "T038379"
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.2",
"product": {
"name": "Oracle Communications \u003c=24.2.2",
"product_id": "T038379-fixed"
}
},
{
"category": "product_version",
"name": "14",
"product": {
"name": "Oracle Communications 14.0",
"product_id": "T038382",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:14.0"
}
}
},
{
"category": "product_version",
"name": "8.2.3.0.0",
"product": {
"name": "Oracle Communications 8.2.3.0.0",
"product_id": "T040441",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:8.2.3.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.2.0.0",
"product": {
"name": "Oracle Communications \u003c=9.0.2.0.0",
"product_id": "T040442"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.2.0.0",
"product": {
"name": "Oracle Communications \u003c=9.0.2.0.0",
"product_id": "T040442-fixed"
}
},
{
"category": "product_version",
"name": "12.11",
"product": {
"name": "Oracle Communications 12.11",
"product_id": "T040443",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:12.11"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8",
"product_id": "T040444"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8",
"product_id": "T040444-fixed"
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Oracle Communications 8.0",
"product_id": "T040445",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:8.0"
}
}
},
{
"category": "product_version",
"name": "8.1",
"product": {
"name": "Oracle Communications 8.1",
"product_id": "T040446",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:8.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.9",
"product": {
"name": "Oracle Communications \u003c=9.1.1.9",
"product_id": "T040447"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.9",
"product": {
"name": "Oracle Communications \u003c=9.1.1.9",
"product_id": "T040447-fixed"
}
},
{
"category": "product_version",
"name": "24.3.0",
"product": {
"name": "Oracle Communications 24.3.0",
"product_id": "T040448",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.3.0"
}
}
},
{
"category": "product_version",
"name": "24.2.3",
"product": {
"name": "Oracle Communications 24.2.3",
"product_id": "T040449",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.3"
}
}
},
{
"category": "product_version",
"name": "8.6.0.4.0",
"product": {
"name": "Oracle Communications 8.6.0.4.0",
"product_id": "T040450",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:8.6.0.4.0"
}
}
},
{
"category": "product_version",
"name": "47.0.0.0.0",
"product": {
"name": "Oracle Communications 47.0.0.0.0",
"product_id": "T040451",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:47.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "9.0.0.0.0",
"product": {
"name": "Oracle Communications 9.0.0.0.0",
"product_id": "T040452",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "15",
"product": {
"name": "Oracle Communications 15.0",
"product_id": "T040453",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:15.0"
}
}
}
],
"category": "product_name",
"name": "Communications"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-40577",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-40577"
},
{
"cve": "CVE-2023-46218",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46604",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-46604"
},
{
"cve": "CVE-2023-50868",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-5678",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2024-0450",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-25638",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-28219",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-33602",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34064",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34750",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35195",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38475",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38807",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38819",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38827",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-41817",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-45492",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47804",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-47804"
},
{
"cve": "CVE-2024-49766",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-49766"
},
{
"cve": "CVE-2024-49767",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50602",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-53677",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-56337",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2024-6119",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-7254",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7885",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-7885"
},
{
"cve": "CVE-2024-8006",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-9143",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-9143"
}
]
}
WID-SEC-W-2025-0225
Vulnerability from csaf_certbund - Published: 2025-01-30 23:00 - Updated: 2025-10-01 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0225 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0225.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0225 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0225"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-022 vom 2025-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2804 vom 2025-04-02",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2804.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "Security Update for Dell PowerProtect Data Domain",
"url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Dell Security Update vom 2025-10-02",
"url": "https://www.dell.com/support/kbdoc/000376224"
}
],
"source_lang": "en-US",
"title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-01T22:00:00.000+00:00",
"generator": {
"date": "2025-10-02T09:05:49.217+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0225",
"initial_release_date": "2025-01-30T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.3.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.0.0",
"product_id": "T040718"
}
},
{
"category": "product_version",
"name": "8.3.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.0.0",
"product_id": "T040718-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.20",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.20",
"product_id": "T040719"
}
},
{
"category": "product_version",
"name": "7.13.1.20",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.20",
"product_id": "T040719-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.20"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.50",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.50",
"product_id": "T040721"
}
},
{
"category": "product_version",
"name": "7.10.1.50",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.50",
"product_id": "T040721-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.50"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
"product_id": "T045879"
}
},
{
"category": "product_version",
"name": "8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.4.0.0",
"product_id": "T045879-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
"product_id": "T045881"
}
},
{
"category": "product_version",
"name": "7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.70",
"product_id": "T045881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
"product_id": "T047343"
}
},
{
"category": "product_version",
"name": "7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.40",
"product_id": "T047343-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
"product_id": "T047344"
}
},
{
"category": "product_version",
"name": "8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.1.10",
"product_id": "T047344-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain Management Center",
"product": {
"name": "Dell PowerProtect Data Domain Management Center",
"product_id": "T045853",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain OS",
"product": {
"name": "Dell PowerProtect Data Domain OS",
"product_id": "T045854",
"product_identification_helper": {
"cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2013-4235"
},
{
"cve": "CVE-2015-8100",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2017-9271",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2017-9271"
},
{
"cve": "CVE-2018-6798",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2018-6798"
},
{
"cve": "CVE-2018-6913",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2018-6913"
},
{
"cve": "CVE-2019-20633",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2019-20633"
},
{
"cve": "CVE-2019-20892",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2020-12762",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-15861",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2021-3521",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-3521"
},
{
"cve": "CVE-2021-37750",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-37750"
},
{
"cve": "CVE-2021-46933",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-46933"
},
{
"cve": "CVE-2021-46955",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-46955"
},
{
"cve": "CVE-2021-47074",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47074"
},
{
"cve": "CVE-2021-47113",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47113"
},
{
"cve": "CVE-2021-47131",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47131"
},
{
"cve": "CVE-2021-47162",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47162"
},
{
"cve": "CVE-2021-47171",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47171"
},
{
"cve": "CVE-2021-47188",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47188"
},
{
"cve": "CVE-2021-47206",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47206"
},
{
"cve": "CVE-2021-47220",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47220"
},
{
"cve": "CVE-2021-47229",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47229"
},
{
"cve": "CVE-2021-47231",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47231"
},
{
"cve": "CVE-2021-47235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47235"
},
{
"cve": "CVE-2022-2601",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-3775",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-3775"
},
{
"cve": "CVE-2022-44792",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-44792"
},
{
"cve": "CVE-2022-44793",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-44793"
},
{
"cve": "CVE-2022-48566",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-48566"
},
{
"cve": "CVE-2023-27043",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28074",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-28074"
},
{
"cve": "CVE-2023-3164",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-3164"
},
{
"cve": "CVE-2023-36632",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-36632"
},
{
"cve": "CVE-2023-4421",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-4421"
},
{
"cve": "CVE-2023-44487",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45288",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-45733",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45733"
},
{
"cve": "CVE-2023-45745",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45745"
},
{
"cve": "CVE-2023-45918",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45918"
},
{
"cve": "CVE-2023-46103",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-46103"
},
{
"cve": "CVE-2023-4692",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-4692"
},
{
"cve": "CVE-2023-47233",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-47855",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-47855"
},
{
"cve": "CVE-2023-49083",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-50782",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-50782"
},
{
"cve": "CVE-2023-52425",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2023-52428",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2023-52527",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52527"
},
{
"cve": "CVE-2023-52586",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52586"
},
{
"cve": "CVE-2023-52591",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52591"
},
{
"cve": "CVE-2023-52646",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52646"
},
{
"cve": "CVE-2023-52653",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52655",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52664",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52664"
},
{
"cve": "CVE-2023-52685",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52685"
},
{
"cve": "CVE-2023-52686",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52691",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52691"
},
{
"cve": "CVE-2023-52696",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52696"
},
{
"cve": "CVE-2023-52698",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52698"
},
{
"cve": "CVE-2023-52703",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52703"
},
{
"cve": "CVE-2023-52730",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52732",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52732"
},
{
"cve": "CVE-2023-52741",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52741"
},
{
"cve": "CVE-2023-52742",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52742"
},
{
"cve": "CVE-2023-52747",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52747"
},
{
"cve": "CVE-2023-52759",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52759"
},
{
"cve": "CVE-2023-52774",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52781",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52781"
},
{
"cve": "CVE-2023-52796",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52821",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52821"
},
{
"cve": "CVE-2023-52864",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52875",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52880",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52880"
},
{
"cve": "CVE-2023-5388",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5388"
},
{
"cve": "CVE-2023-5752",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5752"
},
{
"cve": "CVE-2023-5992",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5992"
},
{
"cve": "CVE-2023-6597",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-0639",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0639"
},
{
"cve": "CVE-2024-0727",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-1737",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-1737"
},
{
"cve": "CVE-2024-1975",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-1975"
},
{
"cve": "CVE-2024-2004",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-20696",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-20696"
},
{
"cve": "CVE-2024-22195",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-2398",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-24577",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-24577"
},
{
"cve": "CVE-2024-24790",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-2511",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-25710",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26458",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26458"
},
{
"cve": "CVE-2024-26461",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26461"
},
{
"cve": "CVE-2024-26625",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26739",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26739"
},
{
"cve": "CVE-2024-26752",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26775",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26775"
},
{
"cve": "CVE-2024-26791",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26828",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26828"
},
{
"cve": "CVE-2024-26846",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26846"
},
{
"cve": "CVE-2024-26874",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26874"
},
{
"cve": "CVE-2024-26876",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26876"
},
{
"cve": "CVE-2024-26900",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26915",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26915"
},
{
"cve": "CVE-2024-26920",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26921",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26929",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26929"
},
{
"cve": "CVE-2024-26930",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26931",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26931"
},
{
"cve": "CVE-2024-26934",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26957",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26957"
},
{
"cve": "CVE-2024-26958",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26984",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26984"
},
{
"cve": "CVE-2024-26996",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26996"
},
{
"cve": "CVE-2024-27008",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27008"
},
{
"cve": "CVE-2024-27054",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27054"
},
{
"cve": "CVE-2024-27059",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27062",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27388",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27396",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27398",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27398"
},
{
"cve": "CVE-2024-27401",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27401"
},
{
"cve": "CVE-2024-27419",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27436",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-28085",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-2961",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-32487",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-33599",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-33871",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33871"
},
{
"cve": "CVE-2024-34062",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34062"
},
{
"cve": "CVE-2024-34064",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34459",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34459"
},
{
"cve": "CVE-2024-35195",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-35235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35235"
},
{
"cve": "CVE-2024-35789",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35791",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35791"
},
{
"cve": "CVE-2024-35809",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35809"
},
{
"cve": "CVE-2024-35811",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35830",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35830"
},
{
"cve": "CVE-2024-35849",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35878",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35887",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35895",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35914",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35914"
},
{
"cve": "CVE-2024-35932",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35932"
},
{
"cve": "CVE-2024-35935",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35944",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35955",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35969",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35982",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-36015",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36029",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36029"
},
{
"cve": "CVE-2024-3651",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-3651"
},
{
"cve": "CVE-2024-36954",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38428",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-39689",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-39689"
},
{
"cve": "CVE-2024-4032",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-41110",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-41110"
},
{
"cve": "CVE-2024-4317",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4317"
},
{
"cve": "CVE-2024-4741",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5206",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-5206"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6232",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6345",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6345"
},
{
"cve": "CVE-2024-6655",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6655"
},
{
"cve": "CVE-2024-7264",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-53295",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-53295"
},
{
"cve": "CVE-2024-51534",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-51534"
},
{
"cve": "CVE-2024-53296",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T045879",
"T000126",
"T040721",
"T047343",
"398363",
"T045881",
"T047344"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-53296"
}
]
}
WID-SEC-W-2025-0143
Vulnerability from csaf_certbund - Published: 2025-01-21 23:00 - Updated: 2025-08-17 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Fusion Middleware b\u00fcndelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0143 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0143.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0143 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0143"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - January 2025 - Appendix Oracle Fusion Middleware vom 2025-01-21",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixFMW"
}
],
"source_lang": "en-US",
"title": "Oracle Fusion Middleware: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-17T22:00:00.000+00:00",
"generator": {
"date": "2025-08-18T11:50:24.468+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0143",
"initial_release_date": "2025-01-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "3",
"summary": "Korrektur"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "12.2.1.4.0",
"product": {
"name": "Oracle Fusion Middleware 12.2.1.4.0",
"product_id": "751674",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.4.0"
}
}
},
{
"category": "product_version",
"name": "14.1.1.0.0",
"product": {
"name": "Oracle Fusion Middleware 14.1.1.0.0",
"product_id": "829576",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:14.1.1.0.0"
}
}
},
{
"category": "product_version",
"name": "8.5.7",
"product": {
"name": "Oracle Fusion Middleware 8.5.7",
"product_id": "T034057",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:8.5.7"
}
}
},
{
"category": "product_version",
"name": "14.1.2.0.0",
"product": {
"name": "Oracle Fusion Middleware 14.1.2.0.0",
"product_id": "T040467",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:14.1.2.0.0"
}
}
}
],
"category": "product_name",
"name": "Fusion Middleware"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12415",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2019-12415"
},
{
"cve": "CVE-2023-44483",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-44483"
},
{
"cve": "CVE-2023-49582",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-49582"
},
{
"cve": "CVE-2023-51775",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2023-7272",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-7272"
},
{
"cve": "CVE-2024-23635",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-23635"
},
{
"cve": "CVE-2024-29857",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-34750",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-38475",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38819",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-45492",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47072",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-47072"
},
{
"cve": "CVE-2024-47554",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-8096",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-8096"
},
{
"cve": "CVE-2025-21498",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21498"
},
{
"cve": "CVE-2025-21535",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21535"
},
{
"cve": "CVE-2025-21549",
"product_status": {
"known_affected": [
"T040467",
"751674",
"T034057",
"829576"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21549"
}
]
}
WID-SEC-W-2024-1467
Vulnerability from csaf_certbund - Published: 2024-06-26 22:00 - Updated: 2025-09-30 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Kerberos ist ein verteilter Netzwerkdienst zur Authentifizierung. MIT Kerberos ist die freie Implementierung des \"Kerberos network authentication protocol\", des Massachusetts Institute of Technology (MIT).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in MIT Kerberos ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1467 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1467.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1467 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1467"
},
{
"category": "external",
"summary": "Kerberos 5 Release 1.21.3 vom 2024-06-26",
"url": "https://web.mit.edu/kerberos/krb5-1.21/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2303-1 vom 2024-07-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018871.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2302-1 vom 2024-07-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018872.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2300-1 vom 2024-07-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018868.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2305-1 vom 2024-07-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018874.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2307-1 vom 2024-07-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018877.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5726 vom 2024-07-05",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2322-1 vom 2024-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018888.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-36514CD080 vom 2024-07-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-36514cd080"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-1F68985052 vom 2024-07-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1f68985052"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-DF2C70DBA9 vom 2024-07-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-df2c70dba9"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2595 vom 2024-07-23",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2595.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4743 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4743"
},
{
"category": "external",
"summary": "SEM 2024.2.1 release notes vom 2024-07-23",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2024-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4734 vom 2024-07-23",
"url": "https://access.redhat.com/errata/RHSA-2024:4734"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
"url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6947-1 vom 2024-08-08",
"url": "https://ubuntu.com/security/notices/USN-6947-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5076 vom 2024-08-07",
"url": "https://access.redhat.com/errata/RHSA-2024:5076"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5312 vom 2024-08-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-5312.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5312 vom 2024-08-14",
"url": "https://access.redhat.com/errata/RHSA-2024:5312"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5316 vom 2024-08-14",
"url": "https://access.redhat.com/errata/RHSA-2024:5316"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5625 vom 2024-08-20",
"url": "https://access.redhat.com/errata/RHSA-2024:5625"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5643 vom 2024-08-20",
"url": "https://access.redhat.com/errata/RHSA-2024:5643"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5630 vom 2024-08-20",
"url": "https://access.redhat.com/errata/RHSA-2024:5630"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5884 vom 2024-08-27",
"url": "https://access.redhat.com/errata/RHSA-2024:5884"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-6166 vom 2024-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2024-6166.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7167095 vom 2024-09-03",
"url": "https://www.ibm.com/support/pages/node/7167095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6166 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6166"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6274 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6274"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7213 vom 2024-09-26",
"url": "https://access.redhat.com/errata/RHSA-2024:7213"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7171536 vom 2024-09-27",
"url": "https://www.ibm.com/support/pages/node/7171536"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7374 vom 2024-09-30",
"url": "https://access.redhat.com/errata/RHSA-2024:7374"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5076 vom 2024-10-01",
"url": "https://linux.oracle.com/errata/ELSA-2024-5076.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7172523 vom 2024-10-08",
"url": "https://www.ibm.com/support/pages/node/7172523"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173420 vom 2024-10-17",
"url": "https://www.ibm.com/support/pages/node/7173420"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7178936 vom 2024-12-14",
"url": "https://www.ibm.com/support/pages/node/7178936"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7178935 vom 2024-12-14",
"url": "https://www.ibm.com/support/pages/node/7178935"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1671 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20051-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html"
},
{
"category": "external",
"summary": "Siemens Security Advisory SSA-082556 vom 2025-06-10",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241108-0007 vom 2025-09-30",
"url": "https://security.netapp.com/advisory/NTAP-20241108-0007"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241108-0009 vom 2025-09-30",
"url": "https://security.netapp.com/advisory/NTAP-20241108-0009"
}
],
"source_lang": "en-US",
"title": "MIT Kerberos: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2025-09-30T22:00:00.000+00:00",
"generator": {
"date": "2025-10-01T06:52:04.984+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1467",
"initial_release_date": "2024-06-26T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-06-26T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-04T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-07T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE, Red Hat und Debian aufgenommen"
},
{
"date": "2024-07-08T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE und Fedora aufgenommen"
},
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-07-23T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-08-07T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-26T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux, IBM und Red Hat aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-10-17T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Siemens aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
}
],
"status": "final",
"version": "27"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Avamar",
"product": {
"name": "EMC Avamar",
"product_id": "T014381",
"product_identification_helper": {
"cpe": "cpe:/a:emc:avamar:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM App Connect Enterprise",
"product": {
"name": "IBM App Connect Enterprise",
"product_id": "T032495",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:-"
}
}
},
{
"category": "product_name",
"name": "IBM DataPower Gateway",
"product": {
"name": "IBM DataPower Gateway",
"product_id": "393635",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Operator v3.2.5",
"product": {
"name": "IBM MQ Operator v3.2.5",
"product_id": "T037871",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator_v3.2.5"
}
}
},
{
"category": "product_version",
"name": "Operator v2.0.27",
"product": {
"name": "IBM MQ Operator v2.0.27",
"product_id": "T037872",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator_v2.0.27"
}
}
}
],
"category": "product_name",
"name": "MQ"
},
{
"branches": [
{
"category": "product_version",
"name": "V10",
"product": {
"name": "IBM Power Hardware Management Console V10",
"product_id": "T023373",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:v10"
}
}
}
],
"category": "product_name",
"name": "Power Hardware Management Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.21.3",
"product": {
"name": "MIT Kerberos \u003c1.21.3",
"product_id": "T035668"
}
},
{
"category": "product_version",
"name": "1.21.3",
"product": {
"name": "MIT Kerberos 1.21.3",
"product_id": "T035668-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mit:kerberos:1.21.3"
}
}
}
],
"category": "product_name",
"name": "Kerberos"
}
],
"category": "vendor",
"name": "MIT"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1500 CPU",
"product": {
"name": "Siemens SIMATIC S7 1500 CPU",
"product_id": "T025776",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:1500_cpu"
}
}
}
],
"category": "product_name",
"name": "SIMATIC S7"
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2024.2",
"product": {
"name": "SolarWinds Security Event Manager \u003c2024.2",
"product_id": "T034244"
}
},
{
"category": "product_version",
"name": "2024.2",
"product": {
"name": "SolarWinds Security Event Manager 2024.2",
"product_id": "T034244-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2024.2"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"T035668",
"T025152",
"67646",
"393635",
"T004914",
"74185",
"T034244",
"T037871",
"T038741",
"T032495",
"T037872",
"T014381",
"2951",
"T002207",
"T000126",
"T031092",
"T024663",
"398363",
"T025776",
"T023373"
]
},
"release_date": "2024-06-26T22:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T035668",
"T025152",
"67646",
"393635",
"T004914",
"74185",
"T034244",
"T037871",
"T038741",
"T032495",
"T037872",
"T014381",
"2951",
"T002207",
"T000126",
"T031092",
"T024663",
"398363",
"T025776",
"T023373"
]
},
"release_date": "2024-06-26T22:00:00.000+00:00",
"title": "CVE-2024-37371"
}
]
}
WID-SEC-W-2024-3195
Vulnerability from csaf_certbund - Published: 2024-10-15 22:00 - Updated: 2024-10-15 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3195 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3195.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3195 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3195"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Communications vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixCGBU"
}
],
"source_lang": "en-US",
"title": "Oracle Communications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-10-15T22:00:00.000+00:00",
"generator": {
"date": "2024-10-16T10:12:35.400+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3195",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9.1.1.3.0",
"product": {
"name": "Oracle Communications 9.1.1.3.0",
"product_id": "T027333",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.1.3.0"
}
}
},
{
"category": "product_version",
"name": "12.6.1.0.0",
"product": {
"name": "Oracle Communications 12.6.1.0.0",
"product_id": "T027338",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:12.6.1.0.0"
}
}
},
{
"category": "product_version",
"name": "5.1",
"product": {
"name": "Oracle Communications 5.1",
"product_id": "T028684",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.1"
}
}
},
{
"category": "product_version",
"name": "15.0.0.0.0",
"product": {
"name": "Oracle Communications 15.0.0.0.0",
"product_id": "T032090",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:15.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "23.4.0",
"product": {
"name": "Oracle Communications 23.4.0",
"product_id": "T032091",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.0"
}
}
},
{
"category": "product_version",
"name": "23.4.2",
"product": {
"name": "Oracle Communications 23.4.2",
"product_id": "T034144",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.2"
}
}
},
{
"category": "product_version",
"name": "24.1.0",
"product": {
"name": "Oracle Communications 24.1.0",
"product_id": "T034145",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.0"
}
}
},
{
"category": "product_version",
"name": "5.2",
"product": {
"name": "Oracle Communications 5.2",
"product_id": "T034146",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.2"
}
}
},
{
"category": "product_version",
"name": "24.1.0.0.0",
"product": {
"name": "Oracle Communications 24.1.0.0.0",
"product_id": "T034147",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "23.4.3",
"product": {
"name": "Oracle Communications 23.4.3",
"product_id": "T036195",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.3"
}
}
},
{
"category": "product_version",
"name": "23.4.4",
"product": {
"name": "Oracle Communications 23.4.4",
"product_id": "T036196",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.0",
"product": {
"name": "Oracle Communications \u003c=24.2.0",
"product_id": "T036197"
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.0",
"product": {
"name": "Oracle Communications \u003c=24.2.0",
"product_id": "T036197-fixed"
}
},
{
"category": "product_version",
"name": "4.1.0",
"product": {
"name": "Oracle Communications 4.1.0",
"product_id": "T036205",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.1.0"
}
}
},
{
"category": "product_version",
"name": "4.2.0",
"product": {
"name": "Oracle Communications 4.2.0",
"product_id": "T036206",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.2.0"
}
}
},
{
"category": "product_version",
"name": "9.2.0",
"product": {
"name": "Oracle Communications 9.2.0",
"product_id": "T036207",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.2.0"
}
}
},
{
"category": "product_version",
"name": "9.3.0",
"product": {
"name": "Oracle Communications 9.3.0",
"product_id": "T036208",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.3.0"
}
}
},
{
"category": "product_version",
"name": "12.11.0",
"product": {
"name": "Oracle Communications 12.11.0",
"product_id": "T036209",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:12.11.0"
}
}
},
{
"category": "product_version",
"name": "9.0.1.10.0",
"product": {
"name": "Oracle Communications 9.0.1.10.0",
"product_id": "T038373",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.0.1.10.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.5",
"product": {
"name": "Oracle Communications \u003c=23.4.5",
"product_id": "T038375"
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.5",
"product": {
"name": "Oracle Communications \u003c=23.4.5",
"product_id": "T038375-fixed"
}
},
{
"category": "product_version",
"name": "24.2.1",
"product": {
"name": "Oracle Communications 24.2.1",
"product_id": "T038376",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.6",
"product": {
"name": "Oracle Communications \u003c=23.4.6",
"product_id": "T038377"
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.6",
"product": {
"name": "Oracle Communications \u003c=23.4.6",
"product_id": "T038377-fixed"
}
},
{
"category": "product_version",
"name": "24.1.1",
"product": {
"name": "Oracle Communications 24.1.1",
"product_id": "T038378",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.1"
}
}
},
{
"category": "product_version",
"name": "24.2.2",
"product": {
"name": "Oracle Communications 24.2.2",
"product_id": "T038379",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.2"
}
}
},
{
"category": "product_version",
"name": "9.1.5",
"product": {
"name": "Oracle Communications 9.1.5",
"product_id": "T038380",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.5"
}
}
},
{
"category": "product_version",
"name": "9.1.0",
"product": {
"name": "Oracle Communications 9.1.0",
"product_id": "T038381",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.0"
}
}
},
{
"category": "product_version",
"name": "14",
"product": {
"name": "Oracle Communications 14.0",
"product_id": "T038382",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:14.0"
}
}
},
{
"category": "product_version",
"name": "9.1.1.9.0",
"product": {
"name": "Oracle Communications 9.1.1.9.0",
"product_id": "T038383",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.1.9.0"
}
}
},
{
"category": "product_version",
"name": "14.0.0.1",
"product": {
"name": "Oracle Communications 14.0.0.1",
"product_id": "T038384",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:14.0.0.1"
}
}
},
{
"category": "product_version",
"name": "17.0.1",
"product": {
"name": "Oracle Communications 17.0.1",
"product_id": "T038385",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:17.0.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.4.0.4",
"product": {
"name": "Oracle Communications \u003c10.4.0.4",
"product_id": "T038386"
}
},
{
"category": "product_version",
"name": "10.4.0.4",
"product": {
"name": "Oracle Communications 10.4.0.4",
"product_id": "T038386-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:10.4.0.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8.0",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8.0",
"product_id": "T038426"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8.0",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8.0",
"product_id": "T038426-fixed"
}
}
],
"category": "product_name",
"name": "Communications"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-23437",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-23437"
},
{
"cve": "CVE-2022-2601",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2023-2953",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-2953"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-38408",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-4043",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-46136",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-46136"
},
{
"cve": "CVE-2023-48795",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51775",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2023-5685",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-6597",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-6816",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0450",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-22020",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22257",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-23672",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-23672"
},
{
"cve": "CVE-2024-2398",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-25062",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-25638",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-26308",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-28182",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29736",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29736"
},
{
"cve": "CVE-2024-29857",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-30251",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-30251"
},
{
"cve": "CVE-2024-31080",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-31080"
},
{
"cve": "CVE-2024-31744",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-31744"
},
{
"cve": "CVE-2024-32760",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-33602",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34750",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38816",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-40898",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-43044",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-45492",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-4577",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-5971",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5971"
},
{
"cve": "CVE-2024-6162",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6387",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-7254",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-7254"
}
]
}
WID-SEC-W-2024-1913
Vulnerability from csaf_certbund - Published: 2024-08-22 22:00 - Updated: 2025-07-30 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Container Platform ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1913 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1913.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1913 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1913"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5433 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5433"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5436 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5439 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5439"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5442 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5442"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5444 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5444"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5446 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5446"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5749 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5749"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6054 vom 2024-08-30",
"url": "https://access.redhat.com/errata/RHSA-2024:6054"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2024-12606.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6159 vom 2024-09-03",
"url": "https://access.redhat.com/errata/RHSA-2024:6159"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0011 vom 2024-09-04",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6011 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6409 vom 2024-09-11",
"url": "https://access.redhat.com/errata/RHSA-2024:6409"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6667 vom 2024-09-13",
"url": "https://access.redhat.com/errata/RHSA-2024:6667"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6642 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6642"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6755 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6755"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6687 vom 2024-09-19",
"url": "https://access.redhat.com/errata/RHSA-2024:6687"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6685 vom 2024-09-19",
"url": "https://access.redhat.com/errata/RHSA-2024:6685"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6998"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6994 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6994"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6995 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6995"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6997"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6811 vom 2024-09-25",
"url": "https://access.redhat.com/errata/RHSA-2024:6811"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7237 vom 2024-09-26",
"url": "https://access.redhat.com/errata/RHSA-2024:7237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7174 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7174"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7436 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3722 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:3722"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3718 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:3718"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7624 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7624"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7184"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7324 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7324"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7744 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7744"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7323 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7323"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8040 vom 2024-10-14",
"url": "https://access.redhat.com/errata/RHSA-2024:8040"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8677 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8677"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8856.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8876 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8876.html"
},
{
"category": "external",
"summary": "Red Hat vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9089"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10775 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10775"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10823 vom 2024-12-12",
"url": "https://access.redhat.com/errata/RHSA-2024:10823"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11562 vom 2025-01-02",
"url": "https://access.redhat.com/errata/RHSA-2024:11562"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180361 vom 2025-01-07",
"url": "https://www.ibm.com/support/pages/node/7180361"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2727 vom 2025-01-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1116 vom 2025-02-13",
"url": "https://access.redhat.com/errata/RHSA-2025:1116"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1038-1 vom 2025-03-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDUSLVUE4ABN4A2UXKEXXYBVNZYOL62N/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1037-1 vom 2025-03-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HRXHLPSCYZEZQ6GJKOABY44N37DC5ST2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1036-1 vom 2025-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14988-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-099 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20013-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7236419 vom 2025-06-30",
"url": "https://www.ibm.com/support/pages/node/7236419"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11669 vom 2025-07-31",
"url": "https://access.redhat.com/errata/RHSA-2025:11669"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift Container Platform: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-30T22:00:00.000+00:00",
"generator": {
"date": "2025-07-31T07:59:47.173+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1913",
"initial_release_date": "2024-08-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-08-29T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von ORACLE und Red Hat aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-24T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-13T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "39"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.6.4",
"product_id": "T040030"
}
},
{
"category": "product_version",
"name": "10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.6.4",
"product_id": "T040030-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.7",
"product": {
"name": "IBM Storage Scale System \u003c6.1.9.7",
"product_id": "T044961"
}
},
{
"category": "product_version",
"name": "6.1.9.7",
"product": {
"name": "IBM Storage Scale System 6.1.9.7",
"product_id": "T044961-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.3.0",
"product": {
"name": "IBM Storage Scale System \u003c6.2.3.0",
"product_id": "T044962"
}
},
{
"category": "product_version",
"name": "6.2.3.0",
"product": {
"name": "IBM Storage Scale System 6.2.3.0",
"product_id": "T044962-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale System"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Advanced Cluster Security for Kubernetes 4",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
"product_id": "T027916",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T038904",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.35",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.35",
"product_id": "T037037"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.35",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.35",
"product_id": "T037037-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.35"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.15.28",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.15.28",
"product_id": "T037038"
}
},
{
"category": "product_version",
"name": "Container Platform 4.15.28",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15.28",
"product_id": "T037038-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.15.28"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.13.48",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.13.48",
"product_id": "T037039"
}
},
{
"category": "product_version",
"name": "Container Platform 4.13.48",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13.48",
"product_id": "T037039-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.13.48"
}
}
},
{
"category": "product_version",
"name": "CodeReady Workspaces",
"product": {
"name": "Red Hat OpenShift CodeReady Workspaces",
"product_id": "T037618",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:codeready_workspaces"
}
}
},
{
"category": "product_version",
"name": "Logging Subsystem 5.9.7",
"product": {
"name": "Red Hat OpenShift Logging Subsystem 5.9.7",
"product_id": "T037939",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging_subsystem_5.9.7"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.38",
"product_id": "T037940"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.38",
"product_id": "T037940-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38"
}
}
},
{
"category": "product_version_range",
"name": "Data Foundation \u003c4.14.11",
"product": {
"name": "Red Hat OpenShift Data Foundation \u003c4.14.11",
"product_id": "T037941"
}
},
{
"category": "product_version",
"name": "Data Foundation 4.14.11",
"product": {
"name": "Red Hat OpenShift Data Foundation 4.14.11",
"product_id": "T037941-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:data_foundation__4.14.11"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.15.42",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.15.42",
"product_id": "T039989"
}
},
{
"category": "product_version",
"name": "Container Platform 4.15.42",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15.42",
"product_id": "T039989-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.15.42"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.54",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.54",
"product_id": "T045757"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.54",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.54",
"product_id": "T045757-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.54"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-15209",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2018-15209"
},
{
"cve": "CVE-2021-46939",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-46939"
},
{
"cve": "CVE-2021-47018",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47018"
},
{
"cve": "CVE-2021-47257",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47257"
},
{
"cve": "CVE-2021-47284",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47284"
},
{
"cve": "CVE-2021-47304",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47304"
},
{
"cve": "CVE-2021-47373",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47373"
},
{
"cve": "CVE-2021-47383",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47383"
},
{
"cve": "CVE-2021-47408",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47408"
},
{
"cve": "CVE-2021-47461",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47461"
},
{
"cve": "CVE-2021-47468",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47468"
},
{
"cve": "CVE-2021-47491",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47491"
},
{
"cve": "CVE-2021-47548",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47548"
},
{
"cve": "CVE-2021-47579",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47579"
},
{
"cve": "CVE-2021-47624",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47624"
},
{
"cve": "CVE-2022-48632",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48632"
},
{
"cve": "CVE-2022-48637",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48637"
},
{
"cve": "CVE-2022-48743",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48743"
},
{
"cve": "CVE-2022-48747",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48747"
},
{
"cve": "CVE-2022-48757",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48757"
},
{
"cve": "CVE-2023-25433",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-25433"
},
{
"cve": "CVE-2023-28746",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-45142",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-45142"
},
{
"cve": "CVE-2023-45290",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-45290"
},
{
"cve": "CVE-2023-47108",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-47108"
},
{
"cve": "CVE-2023-48795",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52356",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52356"
},
{
"cve": "CVE-2023-52448",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52451",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52458",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52458"
},
{
"cve": "CVE-2023-52463",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52469",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52469"
},
{
"cve": "CVE-2023-52471",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52471"
},
{
"cve": "CVE-2023-52486",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52486"
},
{
"cve": "CVE-2023-52530",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52530"
},
{
"cve": "CVE-2023-52619",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52619"
},
{
"cve": "CVE-2023-52622",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52622"
},
{
"cve": "CVE-2023-52623",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52623"
},
{
"cve": "CVE-2023-52635",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52635"
},
{
"cve": "CVE-2023-52648",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52648"
},
{
"cve": "CVE-2023-52651",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52651"
},
{
"cve": "CVE-2023-52653",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52658",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52658"
},
{
"cve": "CVE-2023-52662",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52662"
},
{
"cve": "CVE-2023-52679",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52679"
},
{
"cve": "CVE-2023-52707",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52707"
},
{
"cve": "CVE-2023-52730",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52756",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52756"
},
{
"cve": "CVE-2023-52762",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52762"
},
{
"cve": "CVE-2023-52764",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52764"
},
{
"cve": "CVE-2023-52771",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52771"
},
{
"cve": "CVE-2023-52775",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52775"
},
{
"cve": "CVE-2023-52777",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52777"
},
{
"cve": "CVE-2023-52784",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52784"
},
{
"cve": "CVE-2023-52791",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52791"
},
{
"cve": "CVE-2023-52796",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52809",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52809"
},
{
"cve": "CVE-2023-52811",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52811"
},
{
"cve": "CVE-2023-52832",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52832"
},
{
"cve": "CVE-2023-52834",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52834"
},
{
"cve": "CVE-2023-52845",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52845"
},
{
"cve": "CVE-2023-52847",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52847"
},
{
"cve": "CVE-2023-52864",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52885",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52885"
},
{
"cve": "CVE-2023-6228",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-6228"
},
{
"cve": "CVE-2024-21823",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-21823"
},
{
"cve": "CVE-2024-2201",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-2201"
},
{
"cve": "CVE-2024-24788",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-24788"
},
{
"cve": "CVE-2024-24790",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-25739",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-25739"
},
{
"cve": "CVE-2024-26586",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26601",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26601"
},
{
"cve": "CVE-2024-26614",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26614"
},
{
"cve": "CVE-2024-26640",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26640"
},
{
"cve": "CVE-2024-26660",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26660"
},
{
"cve": "CVE-2024-26669",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26669"
},
{
"cve": "CVE-2024-26686",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26686"
},
{
"cve": "CVE-2024-26698",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26698"
},
{
"cve": "CVE-2024-26704",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26704"
},
{
"cve": "CVE-2024-26733",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26733"
},
{
"cve": "CVE-2024-26737",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26737"
},
{
"cve": "CVE-2024-26740",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26740"
},
{
"cve": "CVE-2024-26772",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26772"
},
{
"cve": "CVE-2024-26773",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26773"
},
{
"cve": "CVE-2024-26802",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26802"
},
{
"cve": "CVE-2024-26810",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26810"
},
{
"cve": "CVE-2024-26837",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26837"
},
{
"cve": "CVE-2024-26840",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26840"
},
{
"cve": "CVE-2024-26843",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26843"
},
{
"cve": "CVE-2024-26852",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26852"
},
{
"cve": "CVE-2024-26853",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26853"
},
{
"cve": "CVE-2024-26855",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26855"
},
{
"cve": "CVE-2024-26870",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26870"
},
{
"cve": "CVE-2024-26878",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26878"
},
{
"cve": "CVE-2024-26897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26897"
},
{
"cve": "CVE-2024-26908",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26908"
},
{
"cve": "CVE-2024-26921",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26925",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-26930",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26940",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26940"
},
{
"cve": "CVE-2024-26947",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26947"
},
{
"cve": "CVE-2024-26958",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26960",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26960"
},
{
"cve": "CVE-2024-26961",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26961"
},
{
"cve": "CVE-2024-27010",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27010"
},
{
"cve": "CVE-2024-27011",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27011"
},
{
"cve": "CVE-2024-27019",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27019"
},
{
"cve": "CVE-2024-27020",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27025",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27025"
},
{
"cve": "CVE-2024-27030",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27030"
},
{
"cve": "CVE-2024-27046",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27046"
},
{
"cve": "CVE-2024-27052",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27052"
},
{
"cve": "CVE-2024-27062",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27065",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27065"
},
{
"cve": "CVE-2024-27388",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27395",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27395"
},
{
"cve": "CVE-2024-27434",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27434"
},
{
"cve": "CVE-2024-31076",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-31076"
},
{
"cve": "CVE-2024-33621",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-33621"
},
{
"cve": "CVE-2024-34064",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35789",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35790",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35790"
},
{
"cve": "CVE-2024-35801",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35801"
},
{
"cve": "CVE-2024-35807",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35807"
},
{
"cve": "CVE-2024-35810",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35810"
},
{
"cve": "CVE-2024-35814",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35814"
},
{
"cve": "CVE-2024-35823",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35823"
},
{
"cve": "CVE-2024-35824",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35824"
},
{
"cve": "CVE-2024-35845",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35845"
},
{
"cve": "CVE-2024-35847",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35847"
},
{
"cve": "CVE-2024-35852",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35852"
},
{
"cve": "CVE-2024-35876",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35876"
},
{
"cve": "CVE-2024-35885",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35885"
},
{
"cve": "CVE-2024-35893",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35893"
},
{
"cve": "CVE-2024-35896",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35896"
},
{
"cve": "CVE-2024-35897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35897"
},
{
"cve": "CVE-2024-35899",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35899"
},
{
"cve": "CVE-2024-35900",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35900"
},
{
"cve": "CVE-2024-35907",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35907"
},
{
"cve": "CVE-2024-35910",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35910"
},
{
"cve": "CVE-2024-35912",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35912"
},
{
"cve": "CVE-2024-35924",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35924"
},
{
"cve": "CVE-2024-35925",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35925"
},
{
"cve": "CVE-2024-35930",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35930"
},
{
"cve": "CVE-2024-35937",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35937"
},
{
"cve": "CVE-2024-35938",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35938"
},
{
"cve": "CVE-2024-35946",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35946"
},
{
"cve": "CVE-2024-35947",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35947"
},
{
"cve": "CVE-2024-35952",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35952"
},
{
"cve": "CVE-2024-35962",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-36000",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36000"
},
{
"cve": "CVE-2024-36005",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36005"
},
{
"cve": "CVE-2024-36006",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36006"
},
{
"cve": "CVE-2024-36010",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36010"
},
{
"cve": "CVE-2024-36016",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36016"
},
{
"cve": "CVE-2024-36017",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36017"
},
{
"cve": "CVE-2024-36020",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36020"
},
{
"cve": "CVE-2024-36025",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36025"
},
{
"cve": "CVE-2024-36270",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36270"
},
{
"cve": "CVE-2024-36286",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36286"
},
{
"cve": "CVE-2024-36489",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36489"
},
{
"cve": "CVE-2024-36886",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36886"
},
{
"cve": "CVE-2024-36889",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36889"
},
{
"cve": "CVE-2024-36896",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36896"
},
{
"cve": "CVE-2024-36904",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36905",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36905"
},
{
"cve": "CVE-2024-36917",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36917"
},
{
"cve": "CVE-2024-36921",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36921"
},
{
"cve": "CVE-2024-36922",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36922"
},
{
"cve": "CVE-2024-36927",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36927"
},
{
"cve": "CVE-2024-36929",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36929"
},
{
"cve": "CVE-2024-36933",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36933"
},
{
"cve": "CVE-2024-36940",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36941",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36941"
},
{
"cve": "CVE-2024-36945",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36945"
},
{
"cve": "CVE-2024-36950",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36950"
},
{
"cve": "CVE-2024-36954",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-36960",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36960"
},
{
"cve": "CVE-2024-36971",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36971"
},
{
"cve": "CVE-2024-36978",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36978"
},
{
"cve": "CVE-2024-36979",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36979"
},
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38384",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38384"
},
{
"cve": "CVE-2024-38428",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-38473",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38538",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38538"
},
{
"cve": "CVE-2024-38555",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38555"
},
{
"cve": "CVE-2024-38556",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38556"
},
{
"cve": "CVE-2024-38573",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38573"
},
{
"cve": "CVE-2024-38575",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38575"
},
{
"cve": "CVE-2024-38586",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38586"
},
{
"cve": "CVE-2024-38596",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38596"
},
{
"cve": "CVE-2024-38598",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38615",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38615"
},
{
"cve": "CVE-2024-38627",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38627"
},
{
"cve": "CVE-2024-38663",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38663"
},
{
"cve": "CVE-2024-39276",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39276"
},
{
"cve": "CVE-2024-39472",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39472"
},
{
"cve": "CVE-2024-39476",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39476"
},
{
"cve": "CVE-2024-39487",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39487"
},
{
"cve": "CVE-2024-39502",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39502"
},
{
"cve": "CVE-2024-39573",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-40897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40897"
},
{
"cve": "CVE-2024-40927",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40927"
},
{
"cve": "CVE-2024-40974",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40974"
},
{
"cve": "CVE-2024-6104",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6104"
},
{
"cve": "CVE-2024-6345",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6345"
},
{
"cve": "CVE-2024-6409",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6409"
}
]
}
WID-SEC-W-2025-2360
Vulnerability from csaf_certbund - Published: 2025-10-21 22:00 - Updated: 2025-11-17 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2360 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2360.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2360 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2360"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2025 - Appendix Oracle Communications Applications vom 2025-10-21",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html#AppendixCAGBU"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-018 vom 2025-11-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/11/Xerox-Security-Bulletin-XRX25-018-Xerox-FreeFlow-Print-Server-v7.pdf"
}
],
"source_lang": "en-US",
"title": "Oracle Communications Applications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-17T23:00:00.000+00:00",
"generator": {
"date": "2025-11-18T08:13:07.419+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2360",
"initial_release_date": "2025-10-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2.0.0.1.0",
"product": {
"name": "Oracle Communications Applications \u003c=2.0.0.1.0",
"product_id": "T047971"
}
},
{
"category": "product_version_range",
"name": "\u003c=2.0.0.1.0",
"product": {
"name": "Oracle Communications Applications \u003c=2.0.0.1.0",
"product_id": "T047971-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.6.0.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.6.0.0",
"product_id": "T047972"
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.6.0.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.6.0.0",
"product_id": "T047972-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=15.0.1.0.0",
"product": {
"name": "Oracle Communications Applications \u003c=15.0.1.0.0",
"product_id": "T047973"
}
},
{
"category": "product_version_range",
"name": "\u003c=15.0.1.0.0",
"product": {
"name": "Oracle Communications Applications \u003c=15.0.1.0.0",
"product_id": "T047973-fixed"
}
},
{
"category": "product_version",
"name": "15.1.0.0.0",
"product": {
"name": "Oracle Communications Applications 15.1.0.0.0",
"product_id": "T047974",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:15.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "8.1.0.28",
"product": {
"name": "Oracle Communications Applications 8.1.0.28",
"product_id": "T047975",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.1.0.28"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=6.1.1",
"product": {
"name": "Oracle Communications Applications \u003c=6.1.1",
"product_id": "T047976"
}
},
{
"category": "product_version_range",
"name": "\u003c=6.1.1",
"product": {
"name": "Oracle Communications Applications \u003c=6.1.1",
"product_id": "T047976-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.8.0",
"product": {
"name": "Oracle Communications Applications \u003c=7.8.0",
"product_id": "T047977"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.8.0",
"product": {
"name": "Oracle Communications Applications \u003c=7.8.0",
"product_id": "T047977-fixed"
}
},
{
"category": "product_version",
"name": "8.0.0.8.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.8.0",
"product_id": "T047978",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.8.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0.9.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.9.0",
"product_id": "T047979",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.9.0"
}
}
},
{
"category": "product_version",
"name": "2.0.0.0.0",
"product": {
"name": "Oracle Communications Applications 2.0.0.0.0",
"product_id": "T047980",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:2.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "2.0.0.1.0",
"product": {
"name": "Oracle Communications Applications 2.0.0.1.0",
"product_id": "T047981",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:2.0.0.1.0"
}
}
},
{
"category": "product_version",
"name": "3.0.3.4.0",
"product": {
"name": "Oracle Communications Applications 3.0.3.4.0",
"product_id": "T047982",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:3.0.3.4.0"
}
}
},
{
"category": "product_version",
"name": "12.0.6.0.0",
"product": {
"name": "Oracle Communications Applications 12.0.6.0.0",
"product_id": "T047983",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:12.0.6.0.0"
}
}
},
{
"category": "product_version",
"name": "7.4.0",
"product": {
"name": "Oracle Communications Applications 7.4.0",
"product_id": "T047984",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.0"
}
}
},
{
"category": "product_version",
"name": "15.0.1.0.0",
"product": {
"name": "Oracle Communications Applications 15.0.1.0.0",
"product_id": "T047992",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:15.0.1.0.0"
}
}
},
{
"category": "product_version",
"name": "15.0.0.0.0",
"product": {
"name": "Oracle Communications Applications 15.0.0.0.0",
"product_id": "T047993",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:15.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "7.3.6",
"product": {
"name": "Oracle Communications Applications 7.3.6",
"product_id": "T047994",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.3.6"
}
}
},
{
"category": "product_version",
"name": "3.0.3.3.0",
"product": {
"name": "Oracle Communications Applications 3.0.3.3.0",
"product_id": "T047996",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:3.0.3.3.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0.7.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.7.0",
"product_id": "T047997",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.7.0"
}
}
},
{
"category": "product_version",
"name": "7.8.0",
"product": {
"name": "Oracle Communications Applications 7.8.0",
"product_id": "T047998",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.8.0"
}
}
},
{
"category": "product_version",
"name": "7.7.0",
"product": {
"name": "Oracle Communications Applications 7.7.0",
"product_id": "T047999",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.7.0"
}
}
},
{
"category": "product_version",
"name": "7.5.1",
"product": {
"name": "Oracle Communications Applications 7.5.1",
"product_id": "T048000",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.5.1"
}
}
},
{
"category": "product_version",
"name": "6.1.1",
"product": {
"name": "Oracle Communications Applications 6.1.1",
"product_id": "T048001",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:6.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.1",
"product": {
"name": "Oracle Communications Applications \u003c=7.5.1",
"product_id": "T048003"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.1",
"product": {
"name": "Oracle Communications Applications \u003c=7.5.1",
"product_id": "T048003-fixed"
}
},
{
"category": "product_version",
"name": "8.2.0.1.0",
"product": {
"name": "Oracle Communications Applications 8.2.0.1.0",
"product_id": "T048004",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.2.0.1.0"
}
}
},
{
"category": "product_version",
"name": "8.1.0.4.0",
"product": {
"name": "Oracle Communications Applications 8.1.0.4.0",
"product_id": "T048005",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.1.0.4.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0.5.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.5.0",
"product_id": "T048006",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.5.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.0.8.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.0.8.0",
"product_id": "T048008"
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.0.8.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.0.8.0",
"product_id": "T048008-fixed"
}
},
{
"category": "product_version",
"name": "7.5.0",
"product": {
"name": "Oracle Communications Applications 7.5.0",
"product_id": "T048009",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.5.0"
}
}
},
{
"category": "product_version",
"name": "7.4.1",
"product": {
"name": "Oracle Communications Applications 7.4.1",
"product_id": "T048010",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.1"
}
}
}
],
"category": "product_name",
"name": "Communications Applications"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12133",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-35164",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-35164"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-50609",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50609"
},
{
"cve": "CVE-2024-51504",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-51504"
},
{
"cve": "CVE-2024-57699",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2024-7254",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-8006",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2025-27210",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-27210"
},
{
"cve": "CVE-2025-27533",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-27533"
},
{
"cve": "CVE-2025-27553",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-27553"
},
{
"cve": "CVE-2025-27817",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-27817"
},
{
"cve": "CVE-2025-32415",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-32990",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-32990"
},
{
"cve": "CVE-2025-4517",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-48734",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-48734"
},
{
"cve": "CVE-2025-48924",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-48976",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49796",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-5115",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-5115"
},
{
"cve": "CVE-2025-52999",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-5318",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-53864",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-53864"
},
{
"cve": "CVE-2025-5399",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-5399"
},
{
"cve": "CVE-2025-54090",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-54090"
},
{
"cve": "CVE-2025-55163",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-5889",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-5889"
},
{
"cve": "CVE-2025-59375",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-59375"
},
{
"cve": "CVE-2025-6965",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-7339",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-7339"
},
{
"cve": "CVE-2025-8058",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-8058"
},
{
"cve": "CVE-2025-9086",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-9086"
}
]
}
WID-SEC-W-2024-3188
Vulnerability from csaf_certbund - Published: 2024-10-15 22:00 - Updated: 2025-06-10 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3188 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3188.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3188 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3188"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle MySQL vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0006 vom 2024-10-25",
"url": "https://security.netapp.com/advisory/ntap-20241025-0006/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0351-1 vom 2024-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7102-1 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7102-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1671 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1673 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1673 vom 2025-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-1673.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1671 vom 2025-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-1671.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1673 vom 2025-02-26",
"url": "https://errata.build.resf.org/RLSA-2025:1673"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7233600 vom 2025-05-15",
"url": "https://www.ibm.com/support/pages/node/7233600"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0006 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0006"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0009 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0009"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0007 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0007"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0005 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0005"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0009 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0009"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0008 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0008"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0007 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0007"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-10T22:00:00.000+00:00",
"generator": {
"date": "2025-06-11T06:26:42.340+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-3188",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-27T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-23T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-26T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von NetApp aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "11.5",
"product": {
"name": "IBM Security Guardium 11.5",
"product_id": "1411051",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:11.5"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
},
{
"category": "product_version",
"name": "for Microsoft Windows",
"product": {
"name": "NetApp ActiveIQ Unified Manager for Microsoft Windows",
"product_id": "T025631",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows"
}
}
},
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T034126",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667-fixed"
}
},
{
"category": "product_version",
"name": "8.4.0",
"product": {
"name": "Oracle MySQL 8.4.0",
"product_id": "T036237",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.4.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21193",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-7264"
}
]
}
WID-SEC-W-2025-0167
Vulnerability from csaf_certbund - Published: 2025-01-21 23:00 - Updated: 2026-01-07 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0167 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0167.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0167 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0167"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - January 2025 - Appendix Oracle MySQL vom 2025-01-21",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250124-0011 vom 2025-01-24",
"url": "https://security.netapp.com/advisory/ntap-20250124-0011/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7245-1 vom 2025-01-30",
"url": "https://ubuntu.com/security/notices/USN-7245-1"
},
{
"category": "external",
"summary": "MariaDB 10.11.11 Release Notes vom 2025-02-05",
"url": "https://mariadb.com/kb/en/mdb-101111-rn/"
},
{
"category": "external",
"summary": "MariaDB 10.5.28 Release Notes vom 2025-02-05",
"url": "https://mariadb.com/kb/en/mdb-10-5-28-rn/"
},
{
"category": "external",
"summary": "MariaDB 10.6.21 Release Notes vom 2025-02-05",
"url": "https://mariadb.com/kb/en/mdb-10621-rn/"
},
{
"category": "external",
"summary": "MariaDB 11.7.2 Release Notes vom 2025-02-13",
"url": "https://mariadb.com/kb/en/mariadb-11-7-2-release-notes/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1671 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1673 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1673 vom 2025-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-1673.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1671 vom 2025-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-1671.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1755 vom 2025-02-24",
"url": "https://access.redhat.com/errata/RHSA-2025:1755"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1756 vom 2025-02-24",
"url": "https://access.redhat.com/errata/RHSA-2025:1756"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1757 vom 2025-02-24",
"url": "https://access.redhat.com/errata/RHSA-2025:1757"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1766 vom 2025-02-24",
"url": "https://access.redhat.com/errata/RHSA-2025:1766"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1767 vom 2025-02-24",
"url": "https://access.redhat.com/errata/RHSA-2025:1767"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1673 vom 2025-02-26",
"url": "https://errata.build.resf.org/RLSA-2025:1673"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4074 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00000.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2882 vom 2025-03-17",
"url": "https://access.redhat.com/errata/RHSA-2025:2882"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2883 vom 2025-03-17",
"url": "https://access.redhat.com/errata/RHSA-2025:2883"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7376-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7376-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7376-2 vom 2025-03-31",
"url": "https://ubuntu.com/security/notices/USN-7376-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01716-1 vom 2025-05-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZD7OICEDCJBRPYYAQ46SMEOBTYRJAAWL/"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250131-0004 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20250131-0004"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250124-0013 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20250124-0013"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250124-0010 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20250124-0010"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19584 vom 2025-11-04",
"url": "https://access.redhat.com/errata/RHSA-2025:19584"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19572 vom 2025-11-04",
"url": "https://access.redhat.com/errata/RHSA-2025:19572"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19584 vom 2025-11-06",
"url": "https://errata.build.resf.org/RLSA-2025:19584"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19584 vom 2025-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2025-19584.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19572 vom 2025-11-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-19572.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19572 vom 2025-12-02",
"url": "https://errata.build.resf.org/RLSA-2025:19572"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0136 vom 2026-01-07",
"url": "https://linux.oracle.com/errata/ELSA-2026-0136.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0136 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0136"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0247 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0247"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-07T23:00:00.000+00:00",
"generator": {
"date": "2026-01-08T08:11:34.735+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-0167",
"initial_release_date": "2025-01-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-23T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-02-24T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-26T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-16T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-06T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-01-07T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "22"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.11.11",
"product": {
"name": "MariaDB MariaDB \u003c10.11.11",
"product_id": "T040788"
}
},
{
"category": "product_version",
"name": "10.11.11",
"product": {
"name": "MariaDB MariaDB 10.11.11",
"product_id": "T040788-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mariadb:mariadb:10.11.11"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.5.28",
"product": {
"name": "MariaDB MariaDB \u003c10.5.28",
"product_id": "T040789"
}
},
{
"category": "product_version",
"name": "10.5.28",
"product": {
"name": "MariaDB MariaDB 10.5.28",
"product_id": "T040789-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mariadb:mariadb:10.5.28"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.6.21",
"product": {
"name": "MariaDB MariaDB \u003c10.6.21",
"product_id": "T040790"
}
},
{
"category": "product_version",
"name": "10.6.21",
"product": {
"name": "MariaDB MariaDB 10.6.21",
"product_id": "T040790-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mariadb:mariadb:10.6.21"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.7.2",
"product": {
"name": "MariaDB MariaDB \u003c11.7.2",
"product_id": "T041151"
}
},
{
"category": "product_version",
"name": "11.7.2",
"product": {
"name": "MariaDB MariaDB 11.7.2",
"product_id": "T041151-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mariadb:mariadb:11.7.2"
}
}
}
],
"category": "product_name",
"name": "MariaDB"
}
],
"category": "vendor",
"name": "MariaDB"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
},
{
"category": "product_version",
"name": "for Microsoft Windows",
"product": {
"name": "NetApp ActiveIQ Unified Manager for Microsoft Windows",
"product_id": "T025631",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows"
}
}
},
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T037607",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "8.4.0",
"product": {
"name": "Oracle MySQL 8.4.0",
"product_id": "1640751",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.4.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "1672258"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "1672258-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "1672259"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "1672259-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "1672261"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "1672261-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.36",
"product": {
"name": "Oracle MySQL \u003c=8.0.36",
"product_id": "1673314"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.36",
"product": {
"name": "Oracle MySQL \u003c=8.0.36",
"product_id": "1673314-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.40",
"product": {
"name": "Oracle MySQL \u003c=8.0.40",
"product_id": "T040476"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.40",
"product": {
"name": "Oracle MySQL \u003c=8.0.40",
"product_id": "T040476-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.3",
"product": {
"name": "Oracle MySQL \u003c=8.4.3",
"product_id": "T040477"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.3",
"product": {
"name": "Oracle MySQL \u003c=8.4.3",
"product_id": "T040477-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.0",
"product": {
"name": "Oracle MySQL \u003c=9.1.0",
"product_id": "T040478"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.0",
"product": {
"name": "Oracle MySQL \u003c=9.1.0",
"product_id": "T040478-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.32",
"product": {
"name": "Oracle MySQL \u003c=7.6.32",
"product_id": "T040479"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.32",
"product": {
"name": "Oracle MySQL \u003c=7.6.32",
"product_id": "T040479-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-11053",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2025-21490",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21490"
},
{
"cve": "CVE-2025-21491",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21491"
},
{
"cve": "CVE-2025-21492",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21492"
},
{
"cve": "CVE-2025-21493",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21493"
},
{
"cve": "CVE-2025-21494",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21494"
},
{
"cve": "CVE-2025-21495",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21495"
},
{
"cve": "CVE-2025-21497",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21497"
},
{
"cve": "CVE-2025-21499",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21499"
},
{
"cve": "CVE-2025-21500",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21500"
},
{
"cve": "CVE-2025-21501",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21501"
},
{
"cve": "CVE-2025-21503",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21503"
},
{
"cve": "CVE-2025-21504",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21504"
},
{
"cve": "CVE-2025-21505",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21505"
},
{
"cve": "CVE-2025-21518",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21518"
},
{
"cve": "CVE-2025-21519",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21519"
},
{
"cve": "CVE-2025-21520",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21520"
},
{
"cve": "CVE-2025-21521",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21521"
},
{
"cve": "CVE-2025-21522",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21522"
},
{
"cve": "CVE-2025-21523",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21523"
},
{
"cve": "CVE-2025-21525",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21525"
},
{
"cve": "CVE-2025-21529",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21529"
},
{
"cve": "CVE-2025-21531",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21531"
},
{
"cve": "CVE-2025-21534",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21534"
},
{
"cve": "CVE-2025-21536",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21536"
},
{
"cve": "CVE-2025-21540",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21540"
},
{
"cve": "CVE-2025-21543",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21543"
},
{
"cve": "CVE-2025-21546",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21546"
},
{
"cve": "CVE-2025-21548",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21548"
},
{
"cve": "CVE-2025-21555",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21555"
},
{
"cve": "CVE-2025-21559",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21559"
},
{
"cve": "CVE-2025-21566",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21566"
},
{
"cve": "CVE-2025-21567",
"product_status": {
"known_affected": [
"T037607",
"T025152",
"67646",
"T040789",
"T004914",
"T032255",
"T040790",
"T041151",
"2951",
"T002207",
"T000126",
"T025631",
"1640751",
"T040788"
],
"last_affected": [
"1672258",
"1673314",
"1672259",
"1672261",
"T040479",
"T040478",
"T040477",
"T040476"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21567"
}
]
}
WID-SEC-W-2025-0135
Vulnerability from csaf_certbund - Published: 2025-01-21 23:00 - Updated: 2025-01-21 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0135 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0135.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0135 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0135"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - January 2025 - Appendix Oracle Communications Applications vom 2025-01-21",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixCAGBU"
}
],
"source_lang": "en-US",
"title": "Oracle Communications Applications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-21T23:00:00.000+00:00",
"generator": {
"date": "2025-01-22T09:03:47.024+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2025-0135",
"initial_release_date": "2025-01-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.4.0",
"product": {
"name": "Oracle Communications Applications 7.4.0",
"product_id": "T018938",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.0"
}
}
},
{
"category": "product_version",
"name": "7.4.1",
"product": {
"name": "Oracle Communications Applications 7.4.1",
"product_id": "T018939",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.0.8",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.0.8",
"product_id": "T034251"
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.0.8",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.0.8",
"product_id": "T034251-fixed"
}
},
{
"category": "product_version",
"name": "15.0.0.0",
"product": {
"name": "Oracle Communications Applications 15.0.0.0",
"product_id": "T034252",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:15.0.0.0"
}
}
},
{
"category": "product_version",
"name": "7.4.2",
"product": {
"name": "Oracle Communications Applications 7.4.2",
"product_id": "T034254",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.2"
}
}
},
{
"category": "product_version",
"name": "7.5.0",
"product": {
"name": "Oracle Communications Applications 7.5.0",
"product_id": "T034255",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.5.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=6.0.5",
"product": {
"name": "Oracle Communications Applications \u003c=6.0.5",
"product_id": "T038372"
}
},
{
"category": "product_version_range",
"name": "\u003c=6.0.5",
"product": {
"name": "Oracle Communications Applications \u003c=6.0.5",
"product_id": "T038372-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=15.0.0.1",
"product": {
"name": "Oracle Communications Applications \u003c=15.0.0.1",
"product_id": "T040433"
}
},
{
"category": "product_version_range",
"name": "\u003c=15.0.0.1",
"product": {
"name": "Oracle Communications Applications \u003c=15.0.0.1",
"product_id": "T040433-fixed"
}
},
{
"category": "product_version",
"name": "15.0.1.0",
"product": {
"name": "Oracle Communications Applications 15.0.1.0",
"product_id": "T040434",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:15.0.1.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0.3",
"product": {
"name": "Oracle Communications Applications 8.0.0.3",
"product_id": "T040435",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.3"
}
}
},
{
"category": "product_version",
"name": "8.1.0.1",
"product": {
"name": "Oracle Communications Applications 8.1.0.1",
"product_id": "T040436",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.1.0.1"
}
}
},
{
"category": "product_version",
"name": "8.1.0.26",
"product": {
"name": "Oracle Communications Applications 8.1.0.26",
"product_id": "T040437",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.1.0.26"
}
}
},
{
"category": "product_version",
"name": "3.0.2.0.0",
"product": {
"name": "Oracle Communications Applications 3.0.2.0.0",
"product_id": "T040438",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:3.0.2.0.0"
}
}
},
{
"category": "product_version",
"name": "3.0.3.0.0",
"product": {
"name": "Oracle Communications Applications 3.0.3.0.0",
"product_id": "T040439",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:3.0.3.0.0"
}
}
},
{
"category": "product_version",
"name": "3.0.3.3.0",
"product": {
"name": "Oracle Communications Applications 3.0.3.3.0",
"product_id": "T040440",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:3.0.3.3.0"
}
}
}
],
"category": "product_name",
"name": "Communications Applications"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-29408",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-29408"
},
{
"cve": "CVE-2024-0232",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-1442",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-1442"
},
{
"cve": "CVE-2024-24786",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-26308",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27309",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-27309"
},
{
"cve": "CVE-2024-28849",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29133",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-35195",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38807",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38827",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-47535",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-47535"
},
{
"cve": "CVE-2024-47554",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-6162",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-7254",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2025-21542",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21542"
},
{
"cve": "CVE-2025-21544",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21544"
},
{
"cve": "CVE-2025-21554",
"notes": [
{
"category": "description",
"text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T040439",
"T040438",
"T040437",
"T040436",
"T034252",
"T040435",
"T040434",
"T018938",
"T018939",
"T034255",
"T034254",
"T040440"
],
"last_affected": [
"T038372",
"T034251",
"T040433"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-21554"
}
]
}
WID-SEC-W-2025-0001
Vulnerability from csaf_certbund - Published: 2025-01-01 23:00 - Updated: 2025-11-18 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter oder lokaler Angreifer kann mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu erzeugen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0001 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0001.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0001 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0001"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2025-01-01",
"url": "https://www.ibm.com/support/pages/node/7180105"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180361 vom 2025-01-07",
"url": "https://www.ibm.com/support/pages/node/7180361"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1227 vom 2025-02-12",
"url": "https://access.redhat.com/errata/RHSA-2025:1227"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7183676 vom 2025-02-27",
"url": "https://www.ibm.com/support/pages/node/7183676"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7229443 vom 2025-03-28",
"url": "https://www.ibm.com/support/pages/node/7229443"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7237702 vom 2025-06-24",
"url": "https://www.ibm.com/support/pages/node/7237702"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249276 vom 2025-10-27",
"url": "https://www.ibm.com/support/pages/node/7249276"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin - November 18 2025",
"url": "https://confluence.atlassian.com/security/security-bulletin-november-18-2025-1671463469.html"
}
],
"source_lang": "en-US",
"title": "IBM DB2: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-18T23:00:00.000+00:00",
"generator": {
"date": "2025-11-19T09:37:09.985+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-0001",
"initial_release_date": "2025-01-01T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-01T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.1",
"product": {
"name": "Atlassian Confluence \u003c10.1.1",
"product_id": "T048680"
}
},
{
"category": "product_version",
"name": "10.1.1",
"product": {
"name": "Atlassian Confluence 10.1.1",
"product_id": "T048680-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:10.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.0.2",
"product": {
"name": "Atlassian Confluence \u003c10.0.2",
"product_id": "T048685"
}
},
{
"category": "product_version",
"name": "10.0.2",
"product": {
"name": "Atlassian Confluence 10.0.2",
"product_id": "T048685-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:10.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.7",
"product": {
"name": "Atlassian Confluence \u003c9.2.7",
"product_id": "T048686"
}
},
{
"category": "product_version",
"name": "9.2.7",
"product": {
"name": "Atlassian Confluence 9.2.7",
"product_id": "T048686-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:9.2.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.5.25",
"product": {
"name": "Atlassian Confluence \u003c8.5.25",
"product_id": "T048687"
}
},
{
"category": "product_version",
"name": "8.5.25",
"product": {
"name": "Atlassian Confluence 8.5.25",
"product_id": "T048687-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.5.25"
}
}
}
],
"category": "product_name",
"name": "Confluence"
}
],
"category": "vendor",
"name": "Atlassian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.4 IF2",
"product": {
"name": "IBM Cognos Analytics \u003c12.0.4 IF2",
"product_id": "T041469"
}
},
{
"category": "product_version",
"name": "12.0.4 IF2",
"product": {
"name": "IBM Cognos Analytics 12.0.4 IF2",
"product_id": "T041469-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:cognos_analytics:12.0.4_if2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.2.4 IF4",
"product": {
"name": "IBM Cognos Analytics \u003c11.2.4 IF4",
"product_id": "T041470"
}
},
{
"category": "product_version",
"name": "11.2.4 IF4",
"product": {
"name": "IBM Cognos Analytics 11.2.4 IF4",
"product_id": "T041470-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:cognos_analytics:11.2.4_if4"
}
}
}
],
"category": "product_name",
"name": "Cognos Analytics"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.1.0",
"product": {
"name": "IBM DB2 \u003c5.1.0",
"product_id": "T039987"
}
},
{
"category": "product_version",
"name": "5.1.0",
"product": {
"name": "IBM DB2 5.1.0",
"product_id": "T039987-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:5.1.0"
}
}
},
{
"category": "product_version_range",
"name": "Warehouse \u003c5.1.0",
"product": {
"name": "IBM DB2 Warehouse \u003c5.1.0",
"product_id": "T039988"
}
},
{
"category": "product_version",
"name": "Warehouse 5.1.0",
"product": {
"name": "IBM DB2 Warehouse 5.1.0",
"product_id": "T039988-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:warehouse__5.1.0"
}
}
},
{
"category": "product_version",
"name": "on Cloud Pak for Data",
"product": {
"name": "IBM DB2 on Cloud Pak for Data",
"product_id": "T042208",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:on_cloud_pak_for_data"
}
}
}
],
"category": "product_name",
"name": "DB2"
},
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.6.4",
"product_id": "T040030"
}
},
{
"category": "product_version",
"name": "10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.6.4",
"product_id": "T040030-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.1.17.1",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.17.1",
"product_id": "T044782"
}
},
{
"category": "product_version",
"name": "10.1.17.1",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.17.1",
"product_id": "T044782-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17.1"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32740",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2021-32740"
},
{
"cve": "CVE-2021-41186",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2021-41186"
},
{
"cve": "CVE-2022-0759",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2022-0759"
},
{
"cve": "CVE-2022-24795",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2022-24795"
},
{
"cve": "CVE-2022-31163",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2022-31163"
},
{
"cve": "CVE-2023-39325",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2023-39325"
},
{
"cve": "CVE-2023-41993",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2023-41993"
},
{
"cve": "CVE-2023-45283",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2023-45283"
},
{
"cve": "CVE-2023-45288",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-6597",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2024-0406",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-0406"
},
{
"cve": "CVE-2024-20918",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-20918"
},
{
"cve": "CVE-2024-20952",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-20952"
},
{
"cve": "CVE-2024-2398",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-24786",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-27281",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-27281"
},
{
"cve": "CVE-2024-2961",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-29857",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-33599",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33883",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-33883"
},
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37890",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-37890"
},
{
"cve": "CVE-2024-39338",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-39338"
},
{
"cve": "CVE-2024-4068",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-4068"
},
{
"cve": "CVE-2024-41110",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-41110"
},
{
"cve": "CVE-2024-41123",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-41123"
},
{
"cve": "CVE-2024-41946",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-41946"
},
{
"cve": "CVE-2024-45296",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-45296"
},
{
"cve": "CVE-2024-45491",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45590",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-45590"
},
{
"cve": "CVE-2024-47220",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-47220"
},
{
"cve": "CVE-2024-47554",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-6119",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6345",
"product_status": {
"known_affected": [
"67646",
"T048680",
"T042208",
"T039988",
"T039987",
"T040030",
"T041470",
"T021415",
"T048685",
"T041469",
"T044782",
"T048687",
"T048686"
]
},
"release_date": "2025-01-01T23:00:00.000+00:00",
"title": "CVE-2024-6345"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0641
Vulnerability from certfr_avis - Published: 2025-07-31 - Updated: 2025-07-31
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Enterprise Security | Enterprise Security versions antérieures à 8.1.0 | ||
| Splunk | Splunk User Behavior Analytics (UBA) | User Behavior Analytics (UBA) versions antérieures à 5.4.3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Enterprise Security versions ant\u00e9rieures \u00e0 8.1.0",
"product": {
"name": "Enterprise Security",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "User Behavior Analytics (UBA) versions ant\u00e9rieures \u00e0 5.4.3",
"product": {
"name": "Splunk User Behavior Analytics (UBA)",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-5590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5590"
},
{
"name": "CVE-2024-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-31141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31141"
},
{
"name": "CVE-2022-33987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2025-25977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25977"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2024-56128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56128"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
}
],
"initial_release_date": "2025-07-31T00:00:00",
"last_revision_date": "2025-07-31T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0641",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0715",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0715"
},
{
"published_at": "2025-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0713",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0713"
},
{
"published_at": "2025-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0714",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0714"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2024-AVI-0958
Vulnerability from certfr_avis - Published: 2024-11-08 - Updated: 2024-11-08
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x antérieures à 2.3.4.1 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.13 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.2 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | AIX | AIX version 7.3 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.3 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 IF01 | ||
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.0 avec Db2 versions antérieures à 11.5.9 Special Build | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix03 | ||
| IBM | VIOS | VIOS version 3.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.27.0 | ||
| IBM | Cloud Transformation Advisor | Cloud Transformation Advisor versions antérieures à 3.10.2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.10.27.0 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix14 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.15 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cloud Pak System versions 2.3.4.x ant\u00e9rieures \u00e0 2.3.4.1",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.13",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.2 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak System versions 2.3.4.0 avec Db2 versions ant\u00e9rieures \u00e0 11.5.9 Special Build",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix03",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 3.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.27.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Transformation Advisor versions ant\u00e9rieures \u00e0 3.10.2 ",
"product": {
"name": "Cloud Transformation Advisor",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.27.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.0 iFix14",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.15",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2022-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23181"
},
{
"name": "CVE-2021-42340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
},
{
"name": "CVE-2022-29885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
},
{
"name": "CVE-2022-34305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34305"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2022-25762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
},
{
"name": "CVE-2022-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42252"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2023-28708",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28708"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26667"
},
{
"name": "CVE-2023-52608",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26727"
},
{
"name": "CVE-2024-26718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26718"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26710"
},
{
"name": "CVE-2024-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2017-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11468"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2021-46939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
},
{
"name": "CVE-2024-26870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-27388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
},
{
"name": "CVE-2024-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2021-47231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
},
{
"name": "CVE-2021-47284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47284"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47408"
},
{
"name": "CVE-2021-47449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47449"
},
{
"name": "CVE-2021-47461",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47461"
},
{
"name": "CVE-2021-47468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
},
{
"name": "CVE-2021-47491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47491"
},
{
"name": "CVE-2021-47548",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47548"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52707"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52756"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-26940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26940"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35938"
},
{
"name": "CVE-2024-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2024-26962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26962"
},
{
"name": "CVE-2024-27434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35897"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-34069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2022-48743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
},
{
"name": "CVE-2022-48747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2024-26703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26703"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26824"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-36489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2021-47018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47018"
},
{
"name": "CVE-2021-47257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47257"
},
{
"name": "CVE-2021-47304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47304"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2021-47624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52471"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2023-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
},
{
"name": "CVE-2023-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2024-43833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2021-42694",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42694"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2021-43980",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43980"
},
{
"name": "CVE-2023-20584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20584"
},
{
"name": "CVE-2023-31356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31356"
},
{
"name": "CVE-2023-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36328"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2023-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5115"
},
{
"name": "CVE-2023-52596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52596"
},
{
"name": "CVE-2023-5764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5764"
},
{
"name": "CVE-2024-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21529"
},
{
"name": "CVE-2024-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
},
{
"name": "CVE-2024-25620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25620"
},
{
"name": "CVE-2024-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26147"
},
{
"name": "CVE-2024-26713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26713"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-26823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26823"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-31882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31882"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-35136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35136"
},
{
"name": "CVE-2024-35152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35152"
},
{
"name": "CVE-2024-37529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37529"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2024-42254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42254"
},
{
"name": "CVE-2024-42255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42255"
},
{
"name": "CVE-2024-42256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42256"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43857"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2024-46982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46982"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2024-11-08T00:00:00",
"last_revision_date": "2024-11-08T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0958",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174802",
"url": "https://www.ibm.com/support/pages/node/7174802"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174634",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174639",
"url": "https://www.ibm.com/support/pages/node/7174639"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175196",
"url": "https://www.ibm.com/support/pages/node/7175196"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175086",
"url": "https://www.ibm.com/support/pages/node/7175086"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175192",
"url": "https://www.ibm.com/support/pages/node/7175192"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174799",
"url": "https://www.ibm.com/support/pages/node/7174799"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174797",
"url": "https://www.ibm.com/support/pages/node/7174797"
},
{
"published_at": "2024-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174945",
"url": "https://www.ibm.com/support/pages/node/7174945"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174912",
"url": "https://www.ibm.com/support/pages/node/7174912"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175166",
"url": "https://www.ibm.com/support/pages/node/7175166"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis - Published: 2025-10-13 - Updated: 2025-10-13
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CERTFR-2025-AVI-0003
Vulnerability from certfr_avis - Published: 2025-01-03 - Updated: 2025-01-03
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Db2 warehouse versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL versions ant\u00e9rieures \u00e0 7.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24795"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2022-31163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31163"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2021-41186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41186"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2022-0759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0759"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2021-32740",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32740"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2024-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47220"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2025-01-03T00:00:00",
"last_revision_date": "2025-01-03T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0003",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180133",
"url": "https://www.ibm.com/support/pages/node/7180133"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180137",
"url": "https://www.ibm.com/support/pages/node/7180137"
},
{
"published_at": "2025-01-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180105",
"url": "https://www.ibm.com/support/pages/node/7180105"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180134",
"url": "https://www.ibm.com/support/pages/node/7180134"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180135",
"url": "https://www.ibm.com/support/pages/node/7180135"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180138",
"url": "https://www.ibm.com/support/pages/node/7180138"
}
]
}
CERTFR-2025-AVI-0054
Vulnerability from certfr_avis - Published: 2025-01-22 - Updated: 2025-01-22
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.36 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Connectors (Connector/Python) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.6.32 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.39 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Backup version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.36 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors (Connector/Python) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.6.32 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21566"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2025-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-21495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21495"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21548"
},
{
"name": "CVE-2025-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21499"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
},
{
"name": "CVE-2025-21493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21493"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21567",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21567"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"initial_release_date": "2025-01-22T00:00:00",
"last_revision_date": "2025-01-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0054",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujan2025",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
]
}
CERTFR-2024-AVI-0884
Vulnerability from certfr_avis - Published: 2024-10-16 - Updated: 2024-10-16
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Monitor version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 9.0.0 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.38 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Monitor version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 9.0.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.38 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21262"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21244"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21232"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2024-21204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21204"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21243"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"initial_release_date": "2024-10-16T00:00:00",
"last_revision_date": "2024-10-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0884",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2024",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
CERTFR-2024-AVI-0903
Vulnerability from certfr_avis - Published: 2024-10-18 - Updated: 2024-10-18
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | WebSphere Application Server Liberty versions 20.0.12 à 24.0.0.10 sans le correctif de sécurité PH63533 ou antérieures à 24.0.0.11 (disponibilité prévue pour le dernier trimestre 2024) | ||
| IBM | N/A | QRadar Incident Forensics versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Storage Protect Server versions 8.1.x antérieures à 8.1.24 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Robotic Process Automation versions 21.0..0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | Robotic Process Automation versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 21.0.0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | QRadar Network Capture versions 7.5.x antérieures à 7.5.0 Update Package 10 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Application Server Liberty versions 20.0.12 \u00e0 24.0.0.10 sans le correctif de s\u00e9curit\u00e9 PH63533 ou ant\u00e9rieures \u00e0 24.0.0.11 (disponibilit\u00e9 pr\u00e9vue pour le dernier trimestre 2024)",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Storage Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.24",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation pour Cloud Pak versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation versions 21.0..0.x ant\u00e9rieures \u00e0 21.0.7.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation pour Cloud Pak versions 21.0.0.x ant\u00e9rieures \u00e0 21.0.7.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Network Capture versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 Update Package 10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2023-25577",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-20592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20592"
},
{
"name": "CVE-2018-1311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1311"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2020-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25219"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2023-23934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2024-31881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31881"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2022-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38725"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-31880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31880"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2024-28762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28762"
},
{
"name": "CVE-2021-45429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45429"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2020-7212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7212"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-28786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28786"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2023-29267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29267"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2020-26154",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26154"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2023-30861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30861"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2024-28752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28752"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"initial_release_date": "2024-10-18T00:00:00",
"last_revision_date": "2024-10-18T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0903",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173421",
"url": "https://www.ibm.com/support/pages/node/7173421"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173043",
"url": "https://www.ibm.com/support/pages/node/7173043"
},
{
"published_at": "2024-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173420",
"url": "https://www.ibm.com/support/pages/node/7173420"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173226",
"url": "https://www.ibm.com/support/pages/node/7173226"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173224",
"url": "https://www.ibm.com/support/pages/node/7173224"
},
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173097",
"url": "https://www.ibm.com/support/pages/node/7173097"
}
]
}
CERTFR-2025-AVI-0492
Vulnerability from certfr_avis - Published: 2025-06-11 - Updated: 2025-06-11
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC432 (6GK5432-0GR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC432 (6GK5432-0GR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC332 (6GK5332-0GA00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SIMATIC | SIMATIC S7-1500 versions supérieures ou égales àV3.1.5 pour les vulnérabilités CVE-2021-41617, CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5363, CVE-2023-6246, CVE-2023-6779, CVE-2023-6780, CVE-2023-28531, CVE-2023-38545, CVE-2023-38546, CVE-2023-44487, CVE-2023-46218, CVE-2023-46219, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52927, CVE-2024-2961, CVE-2024-6119, CVE-2024-6387, CVE-2024-12133, CVE-2024-12243, CVE-2024-24855, CVE-2024-26596, CVE-2024-28085, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-37370, CVE-2024-37371, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-57996, CVE-2024-58005, CVE-2025-4373, CVE-2025-4598, CVE-2025-21701, CVE-2025-21702, CVE-2025-21712, CVE-2025-21724, CVE-2025-21728, CVE-2025-21745, CVE-2025-21756, CVE-2025-21758, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21795, CVE-2025-21796, CVE-2025-21848, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-26465, CVE-2025-31115 et CVE-2025-46836. | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC332 (6GK5332-0GA00-2AC2) versions antérieures à V3.2 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC432 (6GK5432-0GR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC432 (6GK5432-0GR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC332 (6GK5332-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 versions sup\u00e9rieures ou \u00e9gales \u00e0V3.1.5 pour les vuln\u00e9rabilit\u00e9s CVE-2021-41617, CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5363, CVE-2023-6246, CVE-2023-6779, CVE-2023-6780, CVE-2023-28531, CVE-2023-38545, CVE-2023-38546, CVE-2023-44487, CVE-2023-46218, CVE-2023-46219, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52927, CVE-2024-2961, CVE-2024-6119, CVE-2024-6387, CVE-2024-12133, CVE-2024-12243, CVE-2024-24855, CVE-2024-26596, CVE-2024-28085, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-37370, CVE-2024-37371, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-57996, CVE-2024-58005, CVE-2025-4373, CVE-2025-4598, CVE-2025-21701, CVE-2025-21702, CVE-2025-21712, CVE-2025-21724, CVE-2025-21728, CVE-2025-21745, CVE-2025-21756, CVE-2025-21758, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21795, CVE-2025-21796, CVE-2025-21848, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-26465, CVE-2025-31115 et CVE-2025-46836.",
"product": {
"name": "SIMATIC",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC332 (6GK5332-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "SCALANCE",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-41797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41797"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-28531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28531"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-40568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40568"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2023-52927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2025-40569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40569"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2024-26596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26596"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2025-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46836"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2025-40567",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40567"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-21702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
},
{
"name": "CVE-2025-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-21756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
}
],
"initial_release_date": "2025-06-11T00:00:00",
"last_revision_date": "2025-06-11T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0492",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-082556",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-633269",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-633269.html"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693776",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-693776.html"
}
]
}
SUSE-SU-2024:2303-1
Vulnerability from csaf_suse - Published: 2024-07-04 14:25 - Updated: 2024-07-04 14:25Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for krb5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).\n- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2303,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2303,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2303,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2303,SUSE-SUSE-MicroOS-5.1-2024-2303,SUSE-SUSE-MicroOS-5.2-2024-2303,SUSE-Storage-7.1-2024-2303",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2303-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2303-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242303-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2303-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035823.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227186",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "self",
"summary": "SUSE Bug 1227187",
"url": "https://bugzilla.suse.com/1227187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37370 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37371/"
}
],
"title": "Security update for krb5",
"tracking": {
"current_release_date": "2024-07-04T14:25:47Z",
"generator": {
"date": "2024-07-04T14:25:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2303-1",
"initial_release_date": "2024-07-04T14:25:47Z",
"revision_history": [
{
"date": "2024-07-04T14:25:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-client-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-client-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-devel-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-devel-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-mini-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-mini-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-mini-devel-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-mini-devel-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150300.19.1.aarch64",
"product": {
"name": "krb5-server-1.19.2-150300.19.1.aarch64",
"product_id": "krb5-server-1.19.2-150300.19.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-64bit-1.19.2-150300.19.1.aarch64_ilp32",
"product": {
"name": "krb5-64bit-1.19.2-150300.19.1.aarch64_ilp32",
"product_id": "krb5-64bit-1.19.2-150300.19.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "krb5-devel-64bit-1.19.2-150300.19.1.aarch64_ilp32",
"product": {
"name": "krb5-devel-64bit-1.19.2-150300.19.1.aarch64_ilp32",
"product_id": "krb5-devel-64bit-1.19.2-150300.19.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-1.19.2-150300.19.1.i586",
"product_id": "krb5-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-client-1.19.2-150300.19.1.i586",
"product_id": "krb5-client-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-devel-1.19.2-150300.19.1.i586",
"product_id": "krb5-devel-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-mini-1.19.2-150300.19.1.i586",
"product_id": "krb5-mini-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-mini-devel-1.19.2-150300.19.1.i586",
"product_id": "krb5-mini-devel-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.i586",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.i586",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.i586",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.i586",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150300.19.1.i586",
"product": {
"name": "krb5-server-1.19.2-150300.19.1.i586",
"product_id": "krb5-server-1.19.2-150300.19.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-client-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-client-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-devel-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-devel-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-mini-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-mini-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-mini-devel-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-mini-devel-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150300.19.1.ppc64le",
"product": {
"name": "krb5-server-1.19.2-150300.19.1.ppc64le",
"product_id": "krb5-server-1.19.2-150300.19.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-1.19.2-150300.19.1.s390x",
"product_id": "krb5-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-client-1.19.2-150300.19.1.s390x",
"product_id": "krb5-client-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-devel-1.19.2-150300.19.1.s390x",
"product_id": "krb5-devel-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-mini-1.19.2-150300.19.1.s390x",
"product_id": "krb5-mini-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-mini-devel-1.19.2-150300.19.1.s390x",
"product_id": "krb5-mini-devel-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150300.19.1.s390x",
"product": {
"name": "krb5-server-1.19.2-150300.19.1.s390x",
"product_id": "krb5-server-1.19.2-150300.19.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-32bit-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-32bit-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-client-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-client-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-devel-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-devel-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-devel-32bit-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-devel-32bit-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-mini-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-mini-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-mini-devel-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-mini-devel-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150300.19.1.x86_64",
"product": {
"name": "krb5-server-1.19.2-150300.19.1.x86_64",
"product_id": "krb5-server-1.19.2-150300.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.ppc64le"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.s390x"
},
"product_reference": "krb5-1.19.2-150300.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.aarch64"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150300.19.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150300.19.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37370"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37370",
"url": "https://www.suse.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T14:25:47Z",
"details": "important"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37371"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37371",
"url": "https://www.suse.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T14:25:47Z",
"details": "moderate"
}
],
"title": "CVE-2024-37371"
}
]
}
SUSE-SU-2024:2302-1
Vulnerability from csaf_suse - Published: 2024-07-04 14:21 - Updated: 2024-07-04 14:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for krb5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).\n- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2302,SUSE-SLE-Micro-5.5-2024-2302,SUSE-SLE-Module-Basesystem-15-SP5-2024-2302,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2302,openSUSE-SLE-15.5-2024-2302",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2302-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2302-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242302-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2302-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035824.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227186",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "self",
"summary": "SUSE Bug 1227187",
"url": "https://bugzilla.suse.com/1227187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37370 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37371/"
}
],
"title": "Security update for krb5",
"tracking": {
"current_release_date": "2024-07-04T14:21:12Z",
"generator": {
"date": "2024-07-04T14:21:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2302-1",
"initial_release_date": "2024-07-04T14:21:12Z",
"revision_history": [
{
"date": "2024-07-04T14:21:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-client-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-client-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-devel-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-devel-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-mini-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-mini-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-mini-devel-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150500.3.9.1.aarch64",
"product": {
"name": "krb5-server-1.20.1-150500.3.9.1.aarch64",
"product_id": "krb5-server-1.20.1-150500.3.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-64bit-1.20.1-150500.3.9.1.aarch64_ilp32",
"product": {
"name": "krb5-64bit-1.20.1-150500.3.9.1.aarch64_ilp32",
"product_id": "krb5-64bit-1.20.1-150500.3.9.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "krb5-devel-64bit-1.20.1-150500.3.9.1.aarch64_ilp32",
"product": {
"name": "krb5-devel-64bit-1.20.1-150500.3.9.1.aarch64_ilp32",
"product_id": "krb5-devel-64bit-1.20.1-150500.3.9.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-client-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-client-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-devel-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-devel-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-mini-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-mini-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-mini-devel-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150500.3.9.1.i586",
"product": {
"name": "krb5-server-1.20.1-150500.3.9.1.i586",
"product_id": "krb5-server-1.20.1-150500.3.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-client-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-client-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-devel-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-mini-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-mini-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-mini-devel-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150500.3.9.1.ppc64le",
"product": {
"name": "krb5-server-1.20.1-150500.3.9.1.ppc64le",
"product_id": "krb5-server-1.20.1-150500.3.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-client-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-client-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-devel-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-devel-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-mini-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-mini-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-mini-devel-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150500.3.9.1.s390x",
"product": {
"name": "krb5-server-1.20.1-150500.3.9.1.s390x",
"product_id": "krb5-server-1.20.1-150500.3.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-32bit-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-client-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-client-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-devel-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-devel-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-mini-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-mini-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-mini-devel-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-mini-devel-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150500.3.9.1.x86_64",
"product": {
"name": "krb5-server-1.20.1-150500.3.9.1.x86_64",
"product_id": "krb5-server-1.20.1-150500.3.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150500.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-client-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150500.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-client-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150500.3.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-client-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-client-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150500.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-devel-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150500.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150500.3.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-devel-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-devel-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150500.3.9.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-server-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150500.3.9.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-server-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150500.3.9.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-server-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-server-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-client-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150500.3.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-client-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150500.3.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-client-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-client-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-devel-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150500.3.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150500.3.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-devel-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-devel-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.aarch64"
},
"product_reference": "krb5-server-1.20.1-150500.3.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150500.3.9.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.ppc64le"
},
"product_reference": "krb5-server-1.20.1-150500.3.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150500.3.9.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.s390x"
},
"product_reference": "krb5-server-1.20.1-150500.3.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.x86_64"
},
"product_reference": "krb5-server-1.20.1-150500.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37370"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37370",
"url": "https://www.suse.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T14:21:12Z",
"details": "important"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37371"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37371",
"url": "https://www.suse.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.9.1.x86_64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.aarch64",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.ppc64le",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.s390x",
"openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T14:21:12Z",
"details": "moderate"
}
],
"title": "CVE-2024-37371"
}
]
}
SUSE-SU-2024:2300-1
Vulnerability from csaf_suse - Published: 2024-07-04 09:03 - Updated: 2024-07-04 09:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for krb5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).\n- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2300,SUSE-SLE-SDK-12-SP5-2024-2300,SUSE-SLE-SERVER-12-SP5-2024-2300",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2300-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2300-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242300-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2300-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018868.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227186",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "self",
"summary": "SUSE Bug 1227187",
"url": "https://bugzilla.suse.com/1227187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37370 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37371/"
}
],
"title": "Security update for krb5",
"tracking": {
"current_release_date": "2024-07-04T09:03:56Z",
"generator": {
"date": "2024-07-04T09:03:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2300-1",
"initial_release_date": "2024-07-04T09:03:56Z",
"revision_history": [
{
"date": "2024-07-04T09:03:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-1.16.3-46.15.1.aarch64",
"product_id": "krb5-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-client-1.16.3-46.15.1.aarch64",
"product_id": "krb5-client-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-devel-1.16.3-46.15.1.aarch64",
"product_id": "krb5-devel-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-doc-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-doc-1.16.3-46.15.1.aarch64",
"product_id": "krb5-doc-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-mini-1.16.3-46.15.1.aarch64",
"product_id": "krb5-mini-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-mini-devel-1.16.3-46.15.1.aarch64",
"product_id": "krb5-mini-devel-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"product_id": "krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-46.15.1.aarch64",
"product": {
"name": "krb5-server-1.16.3-46.15.1.aarch64",
"product_id": "krb5-server-1.16.3-46.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-64bit-1.16.3-46.15.1.aarch64_ilp32",
"product": {
"name": "krb5-64bit-1.16.3-46.15.1.aarch64_ilp32",
"product_id": "krb5-64bit-1.16.3-46.15.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "krb5-devel-64bit-1.16.3-46.15.1.aarch64_ilp32",
"product": {
"name": "krb5-devel-64bit-1.16.3-46.15.1.aarch64_ilp32",
"product_id": "krb5-devel-64bit-1.16.3-46.15.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-1.16.3-46.15.1.i586",
"product_id": "krb5-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-client-1.16.3-46.15.1.i586",
"product_id": "krb5-client-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-devel-1.16.3-46.15.1.i586",
"product_id": "krb5-devel-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-doc-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-doc-1.16.3-46.15.1.i586",
"product_id": "krb5-doc-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-mini-1.16.3-46.15.1.i586",
"product_id": "krb5-mini-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-mini-devel-1.16.3-46.15.1.i586",
"product_id": "krb5-mini-devel-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.i586",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.i586",
"product_id": "krb5-plugin-preauth-otp-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.i586",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-46.15.1.i586",
"product": {
"name": "krb5-server-1.16.3-46.15.1.i586",
"product_id": "krb5-server-1.16.3-46.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-client-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-client-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-devel-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-devel-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-doc-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-doc-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-doc-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-mini-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-mini-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-mini-devel-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-mini-devel-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-46.15.1.ppc64le",
"product": {
"name": "krb5-server-1.16.3-46.15.1.ppc64le",
"product_id": "krb5-server-1.16.3-46.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-1.16.3-46.15.1.s390",
"product_id": "krb5-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-client-1.16.3-46.15.1.s390",
"product_id": "krb5-client-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-devel-1.16.3-46.15.1.s390",
"product_id": "krb5-devel-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-doc-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-doc-1.16.3-46.15.1.s390",
"product_id": "krb5-doc-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-mini-1.16.3-46.15.1.s390",
"product_id": "krb5-mini-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-mini-devel-1.16.3-46.15.1.s390",
"product_id": "krb5-mini-devel-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390",
"product_id": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-46.15.1.s390",
"product": {
"name": "krb5-server-1.16.3-46.15.1.s390",
"product_id": "krb5-server-1.16.3-46.15.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-1.16.3-46.15.1.s390x",
"product_id": "krb5-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-32bit-1.16.3-46.15.1.s390x",
"product_id": "krb5-32bit-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-client-1.16.3-46.15.1.s390x",
"product_id": "krb5-client-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-devel-1.16.3-46.15.1.s390x",
"product_id": "krb5-devel-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-devel-32bit-1.16.3-46.15.1.s390x",
"product_id": "krb5-devel-32bit-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-doc-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-doc-1.16.3-46.15.1.s390x",
"product_id": "krb5-doc-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-mini-1.16.3-46.15.1.s390x",
"product_id": "krb5-mini-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-mini-devel-1.16.3-46.15.1.s390x",
"product_id": "krb5-mini-devel-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"product_id": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-46.15.1.s390x",
"product": {
"name": "krb5-server-1.16.3-46.15.1.s390x",
"product_id": "krb5-server-1.16.3-46.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-1.16.3-46.15.1.x86_64",
"product_id": "krb5-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-32bit-1.16.3-46.15.1.x86_64",
"product_id": "krb5-32bit-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-client-1.16.3-46.15.1.x86_64",
"product_id": "krb5-client-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-devel-1.16.3-46.15.1.x86_64",
"product_id": "krb5-devel-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-devel-32bit-1.16.3-46.15.1.x86_64",
"product_id": "krb5-devel-32bit-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-doc-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-doc-1.16.3-46.15.1.x86_64",
"product_id": "krb5-doc-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-mini-1.16.3-46.15.1.x86_64",
"product_id": "krb5-mini-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-mini-devel-1.16.3-46.15.1.x86_64",
"product_id": "krb5-mini-devel-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"product_id": "krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-46.15.1.x86_64",
"product": {
"name": "krb5-server-1.16.3-46.15.1.x86_64",
"product_id": "krb5-server-1.16.3-46.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-devel-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-devel-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-devel-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-devel-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-32bit-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-32bit-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-client-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-client-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-client-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-client-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-doc-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-doc-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-doc-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-doc-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-doc-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-doc-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-doc-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-doc-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-server-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-server-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-server-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-server-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-32bit-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-32bit-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-client-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-client-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-client-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-client-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-doc-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-doc-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-doc-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-doc-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-doc-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-doc-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-doc-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-doc-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-46.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.aarch64"
},
"product_reference": "krb5-server-1.16.3-46.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-46.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le"
},
"product_reference": "krb5-server-1.16.3-46.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-46.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.s390x"
},
"product_reference": "krb5-server-1.16.3-46.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-46.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.x86_64"
},
"product_reference": "krb5-server-1.16.3-46.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37370"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37370",
"url": "https://www.suse.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T09:03:56Z",
"details": "important"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37371"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37371",
"url": "https://www.suse.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T09:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2024-37371"
}
]
}
SUSE-SU-2024:2305-1
Vulnerability from csaf_suse - Published: 2024-07-04 22:13 - Updated: 2024-07-04 22:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for krb5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).\n- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2305,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2305,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2305,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2305",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2305-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2305-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242305-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2305-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018874.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227186",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "self",
"summary": "SUSE Bug 1227187",
"url": "https://bugzilla.suse.com/1227187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37370 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37371/"
}
],
"title": "Security update for krb5",
"tracking": {
"current_release_date": "2024-07-04T22:13:07Z",
"generator": {
"date": "2024-07-04T22:13:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2305-1",
"initial_release_date": "2024-07-04T22:13:07Z",
"revision_history": [
{
"date": "2024-07-04T22:13:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-1.16.3-150100.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-client-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-client-1.16.3-150100.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-devel-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-devel-1.16.3-150100.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-mini-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-mini-1.16.3-150100.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-mini-devel-1.16.3-150100.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-150100.3.36.1.aarch64",
"product": {
"name": "krb5-server-1.16.3-150100.3.36.1.aarch64",
"product_id": "krb5-server-1.16.3-150100.3.36.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-64bit-1.16.3-150100.3.36.1.aarch64_ilp32",
"product": {
"name": "krb5-64bit-1.16.3-150100.3.36.1.aarch64_ilp32",
"product_id": "krb5-64bit-1.16.3-150100.3.36.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "krb5-devel-64bit-1.16.3-150100.3.36.1.aarch64_ilp32",
"product": {
"name": "krb5-devel-64bit-1.16.3-150100.3.36.1.aarch64_ilp32",
"product_id": "krb5-devel-64bit-1.16.3-150100.3.36.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-1.16.3-150100.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-client-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-client-1.16.3-150100.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-devel-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-devel-1.16.3-150100.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-mini-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-mini-1.16.3-150100.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-mini-devel-1.16.3-150100.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-150100.3.36.1.i586",
"product": {
"name": "krb5-server-1.16.3-150100.3.36.1.i586",
"product_id": "krb5-server-1.16.3-150100.3.36.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-1.16.3-150100.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-client-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-client-1.16.3-150100.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-devel-1.16.3-150100.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-mini-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-mini-1.16.3-150100.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-mini-devel-1.16.3-150100.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-150100.3.36.1.ppc64le",
"product": {
"name": "krb5-server-1.16.3-150100.3.36.1.ppc64le",
"product_id": "krb5-server-1.16.3-150100.3.36.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-1.16.3-150100.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-client-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-client-1.16.3-150100.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-devel-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-devel-1.16.3-150100.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-mini-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-mini-1.16.3-150100.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-mini-devel-1.16.3-150100.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-150100.3.36.1.s390x",
"product": {
"name": "krb5-server-1.16.3-150100.3.36.1.s390x",
"product_id": "krb5-server-1.16.3-150100.3.36.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-32bit-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-client-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-client-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-devel-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-devel-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-devel-32bit-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-devel-32bit-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-mini-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-mini-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-mini-devel-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-mini-devel-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.16.3-150100.3.36.1.x86_64",
"product": {
"name": "krb5-server-1.16.3-150100.3.36.1.x86_64",
"product_id": "krb5-server-1.16.3-150100.3.36.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-client-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-client-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-devel-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-devel-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-server-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-server-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-150100.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.s390x"
},
"product_reference": "krb5-1.16.3-150100.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-client-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-client-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-150100.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.s390x"
},
"product_reference": "krb5-client-1.16.3-150100.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-client-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-devel-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-150100.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.s390x"
},
"product_reference": "krb5-devel-1.16.3-150100.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-devel-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-150100.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64"
},
"product_reference": "krb5-server-1.16.3-150100.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-server-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-150100.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.s390x"
},
"product_reference": "krb5-server-1.16.3-150100.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-server-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-client-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-client-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-devel-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-150100.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.ppc64le"
},
"product_reference": "krb5-server-1.16.3-150100.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.16.3-150100.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.x86_64"
},
"product_reference": "krb5-server-1.16.3-150100.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37370"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37370",
"url": "https://www.suse.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T22:13:07Z",
"details": "important"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37371"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37371",
"url": "https://www.suse.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T22:13:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-37371"
}
]
}
SUSE-SU-2025:20051-1
Vulnerability from csaf_suse - Published: 2025-02-03 08:56 - Updated: 2025-02-03 08:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for krb5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-37370: Confidential GSS krb5 wrap tokens with invalid plaintext Extra Count fields were erroneously accepted during unwrap (bsc#1227186)\n- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187)\n- CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770)\n- CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771)\n- CVE-2024-26462: Fixed memory leak at /krb5/src/kdc/ndr.c (bsc#1220772)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-74",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20051-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20051-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520051-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20051-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html"
},
{
"category": "self",
"summary": "SUSE Bug 1220770",
"url": "https://bugzilla.suse.com/1220770"
},
{
"category": "self",
"summary": "SUSE Bug 1220771",
"url": "https://bugzilla.suse.com/1220771"
},
{
"category": "self",
"summary": "SUSE Bug 1220772",
"url": "https://bugzilla.suse.com/1220772"
},
{
"category": "self",
"summary": "SUSE Bug 1227186",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "self",
"summary": "SUSE Bug 1227187",
"url": "https://bugzilla.suse.com/1227187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26458 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26458/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26461 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26461/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26462 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37370 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37371/"
}
],
"title": "Security update for krb5",
"tracking": {
"current_release_date": "2025-02-03T08:56:00Z",
"generator": {
"date": "2025-02-03T08:56:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20051-1",
"initial_release_date": "2025-02-03T08:56:00Z",
"revision_history": [
{
"date": "2025-02-03T08:56:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-5.1.aarch64",
"product": {
"name": "krb5-1.20.1-5.1.aarch64",
"product_id": "krb5-1.20.1-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-5.1.aarch64",
"product": {
"name": "krb5-client-1.20.1-5.1.aarch64",
"product_id": "krb5-client-1.20.1-5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-5.1.s390x",
"product": {
"name": "krb5-1.20.1-5.1.s390x",
"product_id": "krb5-1.20.1-5.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-5.1.s390x",
"product": {
"name": "krb5-client-1.20.1-5.1.s390x",
"product_id": "krb5-client-1.20.1-5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-5.1.x86_64",
"product": {
"name": "krb5-1.20.1-5.1.x86_64",
"product_id": "krb5-1.20.1-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-5.1.x86_64",
"product": {
"name": "krb5-client-1.20.1-5.1.x86_64",
"product_id": "krb5-client-1.20.1-5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-5.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64"
},
"product_reference": "krb5-1.20.1-5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-5.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x"
},
"product_reference": "krb5-1.20.1-5.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-5.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64"
},
"product_reference": "krb5-1.20.1-5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-5.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64"
},
"product_reference": "krb5-client-1.20.1-5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-5.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x"
},
"product_reference": "krb5-client-1.20.1-5.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-5.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
},
"product_reference": "krb5-client-1.20.1-5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-26458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26458"
}
],
"notes": [
{
"category": "general",
"text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26458",
"url": "https://www.suse.com/security/cve/CVE-2024-26458"
},
{
"category": "external",
"summary": "SUSE Bug 1220770 for CVE-2024-26458",
"url": "https://bugzilla.suse.com/1220770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:56:00Z",
"details": "important"
}
],
"title": "CVE-2024-26458"
},
{
"cve": "CVE-2024-26461",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26461"
}
],
"notes": [
{
"category": "general",
"text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26461",
"url": "https://www.suse.com/security/cve/CVE-2024-26461"
},
{
"category": "external",
"summary": "SUSE Bug 1220770 for CVE-2024-26461",
"url": "https://bugzilla.suse.com/1220770"
},
{
"category": "external",
"summary": "SUSE Bug 1220771 for CVE-2024-26461",
"url": "https://bugzilla.suse.com/1220771"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:56:00Z",
"details": "important"
}
],
"title": "CVE-2024-26461"
},
{
"cve": "CVE-2024-26462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26462"
}
],
"notes": [
{
"category": "general",
"text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26462",
"url": "https://www.suse.com/security/cve/CVE-2024-26462"
},
{
"category": "external",
"summary": "SUSE Bug 1220770 for CVE-2024-26462",
"url": "https://bugzilla.suse.com/1220770"
},
{
"category": "external",
"summary": "SUSE Bug 1220772 for CVE-2024-26462",
"url": "https://bugzilla.suse.com/1220772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:56:00Z",
"details": "important"
}
],
"title": "CVE-2024-26462"
},
{
"cve": "CVE-2024-37370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37370"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37370",
"url": "https://www.suse.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:56:00Z",
"details": "important"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37371"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37371",
"url": "https://www.suse.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-1.20.1-5.1.x86_64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.aarch64",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.s390x",
"SUSE Linux Micro 6.0:krb5-client-1.20.1-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:56:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-37371"
}
]
}
SUSE-SU-2024:2307-1
Vulnerability from csaf_suse - Published: 2024-07-05 10:04 - Updated: 2024-07-05 10:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for krb5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).\n- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2307,SUSE-SLE-Module-Basesystem-15-SP6-2024-2307,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2307,openSUSE-SLE-15.6-2024-2307",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2307-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2307-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242307-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2307-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035829.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227186",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "self",
"summary": "SUSE Bug 1227187",
"url": "https://bugzilla.suse.com/1227187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37370 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37371/"
}
],
"title": "Security update for krb5",
"tracking": {
"current_release_date": "2024-07-05T10:04:35Z",
"generator": {
"date": "2024-07-05T10:04:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2307-1",
"initial_release_date": "2024-07-05T10:04:35Z",
"revision_history": [
{
"date": "2024-07-05T10:04:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-client-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-client-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-devel-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-devel-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-mini-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-mini-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-mini-devel-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150600.11.3.1.aarch64",
"product": {
"name": "krb5-server-1.20.1-150600.11.3.1.aarch64",
"product_id": "krb5-server-1.20.1-150600.11.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-64bit-1.20.1-150600.11.3.1.aarch64_ilp32",
"product": {
"name": "krb5-64bit-1.20.1-150600.11.3.1.aarch64_ilp32",
"product_id": "krb5-64bit-1.20.1-150600.11.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "krb5-devel-64bit-1.20.1-150600.11.3.1.aarch64_ilp32",
"product": {
"name": "krb5-devel-64bit-1.20.1-150600.11.3.1.aarch64_ilp32",
"product_id": "krb5-devel-64bit-1.20.1-150600.11.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-client-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-client-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-devel-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-devel-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-mini-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-mini-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-mini-devel-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150600.11.3.1.i586",
"product": {
"name": "krb5-server-1.20.1-150600.11.3.1.i586",
"product_id": "krb5-server-1.20.1-150600.11.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-client-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-client-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-devel-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-mini-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-mini-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-mini-devel-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150600.11.3.1.ppc64le",
"product": {
"name": "krb5-server-1.20.1-150600.11.3.1.ppc64le",
"product_id": "krb5-server-1.20.1-150600.11.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-client-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-client-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-devel-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-devel-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-mini-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-mini-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-mini-devel-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150600.11.3.1.s390x",
"product": {
"name": "krb5-server-1.20.1-150600.11.3.1.s390x",
"product_id": "krb5-server-1.20.1-150600.11.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-32bit-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-client-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-client-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-devel-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-devel-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-mini-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-mini-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-mini-devel-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-mini-devel-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.20.1-150600.11.3.1.x86_64",
"product": {
"name": "krb5-server-1.20.1-150600.11.3.1.x86_64",
"product_id": "krb5-server-1.20.1-150600.11.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150600.11.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150600.11.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150600.11.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150600.11.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.20.1-150600.11.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-32bit-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150600.11.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-client-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150600.11.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-client-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150600.11.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-client-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150600.11.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-client-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150600.11.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-devel-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150600.11.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150600.11.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-devel-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150600.11.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-devel-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150600.11.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-server-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150600.11.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-server-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150600.11.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-server-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150600.11.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-server-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150600.11.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150600.11.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150600.11.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-32bit-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150600.11.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-client-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150600.11.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-client-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150600.11.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-client-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-client-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150600.11.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-devel-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150600.11.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150600.11.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-devel-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-devel-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150600.11.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.aarch64"
},
"product_reference": "krb5-server-1.20.1-150600.11.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150600.11.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.ppc64le"
},
"product_reference": "krb5-server-1.20.1-150600.11.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150600.11.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.s390x"
},
"product_reference": "krb5-server-1.20.1-150600.11.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.20.1-150600.11.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.x86_64"
},
"product_reference": "krb5-server-1.20.1-150600.11.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37370"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37370",
"url": "https://www.suse.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T10:04:35Z",
"details": "important"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37371"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37371",
"url": "https://www.suse.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:krb5-server-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-client-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-devel-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-devel-32bit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-kdb-ldap-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-otp-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-pkinit-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-plugin-preauth-spake-1.20.1-150600.11.3.1.x86_64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.aarch64",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.ppc64le",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.s390x",
"openSUSE Leap 15.6:krb5-server-1.20.1-150600.11.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T10:04:35Z",
"details": "moderate"
}
],
"title": "CVE-2024-37371"
}
]
}
SUSE-SU-2024:2322-1
Vulnerability from csaf_suse - Published: 2024-07-08 12:54 - Updated: 2024-07-08 12:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for krb5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).\n- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2322,SUSE-SLE-Micro-5.3-2024-2322,SUSE-SLE-Micro-5.4-2024-2322,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2322,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2322,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2322,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2322,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2322,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2322,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2322",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2322-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2322-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242322-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2322-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035853.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227186",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "self",
"summary": "SUSE Bug 1227187",
"url": "https://bugzilla.suse.com/1227187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37370 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37371/"
}
],
"title": "Security update for krb5",
"tracking": {
"current_release_date": "2024-07-08T12:54:19Z",
"generator": {
"date": "2024-07-08T12:54:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2322-1",
"initial_release_date": "2024-07-08T12:54:19Z",
"revision_history": [
{
"date": "2024-07-08T12:54:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-client-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-client-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-devel-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-devel-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-mini-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-mini-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-mini-devel-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150400.3.12.1.aarch64",
"product": {
"name": "krb5-server-1.19.2-150400.3.12.1.aarch64",
"product_id": "krb5-server-1.19.2-150400.3.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-64bit-1.19.2-150400.3.12.1.aarch64_ilp32",
"product": {
"name": "krb5-64bit-1.19.2-150400.3.12.1.aarch64_ilp32",
"product_id": "krb5-64bit-1.19.2-150400.3.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "krb5-devel-64bit-1.19.2-150400.3.12.1.aarch64_ilp32",
"product": {
"name": "krb5-devel-64bit-1.19.2-150400.3.12.1.aarch64_ilp32",
"product_id": "krb5-devel-64bit-1.19.2-150400.3.12.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-client-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-client-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-devel-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-devel-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-mini-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-mini-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-mini-devel-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150400.3.12.1.i586",
"product": {
"name": "krb5-server-1.19.2-150400.3.12.1.i586",
"product_id": "krb5-server-1.19.2-150400.3.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-client-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-client-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-devel-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-mini-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-mini-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-mini-devel-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150400.3.12.1.ppc64le",
"product": {
"name": "krb5-server-1.19.2-150400.3.12.1.ppc64le",
"product_id": "krb5-server-1.19.2-150400.3.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-client-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-client-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-devel-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-devel-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-mini-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-mini-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-mini-devel-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150400.3.12.1.s390x",
"product": {
"name": "krb5-server-1.19.2-150400.3.12.1.s390x",
"product_id": "krb5-server-1.19.2-150400.3.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-32bit-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-client-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-client-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-devel-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-devel-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-devel-32bit-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-devel-32bit-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-mini-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-mini-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-mini-devel-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-mini-devel-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.19.2-150400.3.12.1.x86_64",
"product": {
"name": "krb5-server-1.19.2-150400.3.12.1.x86_64",
"product_id": "krb5-server-1.19.2-150400.3.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-client-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-devel-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.ppc64le"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.s390x"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.19.2-150400.3.12.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64"
},
"product_reference": "krb5-server-1.19.2-150400.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37370"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37370",
"url": "https://www.suse.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-08T12:54:19Z",
"details": "important"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37371"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37371",
"url": "https://www.suse.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.12.1.x86_64",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.ppc64le",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.s390x",
"SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-08T12:54:19Z",
"details": "moderate"
}
],
"title": "CVE-2024-37371"
}
]
}
ICSA-25-162-05
Vulnerability from csaf_cisa - Published: 2025-06-10 00:00 - Updated: 2025-08-12 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nSiemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-082556 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-082556.json"
},
{
"category": "self",
"summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-162-05 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-162-05.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-162-05 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5",
"tracking": {
"current_release_date": "2025-08-12T00:00:00.000000Z",
"generator": {
"date": "2025-08-14T23:08:52.425782Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-162-05",
"initial_release_date": "2025-06-10T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-06-10T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-08-12T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2025-6395, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=3.1.5",
"product": {
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6ES7518-4AX00-1AB0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=3.1.5",
"product": {
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6ES7518-4AX00-1AC0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=3.1.5",
"product": {
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6ES7518-4FX00-1AB0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=3.1.5",
"product": {
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6ES7518-4FX00-1AC0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=3.1.5",
"product": {
"name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6AG1518-4AX00-4AC0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-41617",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2021-41617"
},
{
"cve": "CVE-2023-4527",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-4527"
},
{
"cve": "CVE-2023-4806",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-4806"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-684",
"name": "Incorrect Provision of Specified Functionality"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-6246",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-6246"
},
{
"cve": "CVE-2023-6779",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-6779"
},
{
"cve": "CVE-2023-6780",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-6780"
},
{
"cve": "CVE-2023-28531",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-28531"
},
{
"cve": "CVE-2023-38545",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-38545"
},
{
"cve": "CVE-2023-38546",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "summary",
"text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-38546"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "summary",
"text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52927",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the exp not to be removed when the created ct will not be confirmed, like in OVS and TC conntrack in the following patches. This patch allows exp not to be removed by setting IPS_CONFIRMED in the status of the tmpl.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2023-52927"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don\u0027t perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6387",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"notes": [
{
"category": "summary",
"text": "A security regression (CVE-2006-5051) was discovered in OpenSSH\u0027s server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "summary",
"text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-12243",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-12243"
},
{
"cve": "CVE-2024-24855",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-24855"
},
{
"cve": "CVE-2024-26596",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: dsa: netdev_priv() dereference before check on non-DSA netdevice events.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-26596"
},
{
"cve": "CVE-2024-28085",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow. This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference. This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients. The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "summary",
"text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-34397"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "summary",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-50246",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/ntfs3: Add rough attr alloc_size check",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-50246"
},
{
"cve": "CVE-2024-53166",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "block, bfq: bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq from bic without the lock, this can lead to UAF if the io_context is shared by multiple tasks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-57977",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "memcg: A soft lockup vulnerability in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-57977"
},
{
"cve": "CVE-2024-57996",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "net_sched: sch_sfq: vulnerability caused by incorrectly handling a packet limit of 1, leading to an array-index-out-of-bounds error and subsequent crash when the queue length is decremented for an empty slot.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-57996"
},
{
"cve": "CVE-2024-58005",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tpm: Change to kvalloc() in eventlog/acpi.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2024-58005"
},
{
"cve": "CVE-2025-4373",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "GLib is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-4598",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\r\n\r\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-4598"
},
{
"cve": "CVE-2025-6395",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-6395"
},
{
"cve": "CVE-2025-21701",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "net: vulnerability arises because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, leading to potential use of destroyed locks, which is fixed by denying operations on devices being unregistered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21701"
},
{
"cve": "CVE-2025-21702",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21702"
},
{
"cve": "CVE-2025-21712",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "md/md-bitmap: vulnerability caused by bitmap_get_stats() can be called even if the bitmap is destroyed or not fully initialized, leading to a kernel crash, which is fixed by synchronizing bitmap_get_stats() with bitmap_info.mutex.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21712"
},
{
"cve": "CVE-2025-21724",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index(). Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant \"1\" (of type int) by bitmap-\u003emapped.pgshift (an unsigned long value) could result in undefined behavior. The constant \"1\" defaults to a 32-bit \"int\", and when \"pgshift\" exceeds 31 (e.g., pgshift = 63) the shift operation overflows, as the result cannot be represented in a 32-bit type.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21724"
},
{
"cve": "CVE-2025-21728",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21728"
},
{
"cve": "CVE-2025-21745",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix class @block_class\u0027s subsystem refcount leakage\r\n\r\nblkcg_fill_root_iostats() iterates over @block_class\u0027s devices by\r\nclass_dev_iter_(init|next)(), but does not end iterating with\r\nclass_dev_iter_exit(), so causes the class\u0027s subsystem refcount leakage.\r\n\r\nFix by ending the iterating with class_dev_iter_exit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21745"
},
{
"cve": "CVE-2025-21756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21756"
},
{
"cve": "CVE-2025-21758",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21758"
},
{
"cve": "CVE-2025-21765",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21765"
},
{
"cve": "CVE-2025-21766",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv4: use RCU protection in __ip_rt_update_pmtu(). __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21766"
},
{
"cve": "CVE-2025-21767",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context The following bug report happened with a PREEMPT_RT kernel: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 get_random_u32+0x4f/0x110 clocksource_verify_choose_cpus+0xab/0x1a0 clocksource_verify_percpu.part.0+0x6b/0x330 clocksource_watchdog_kthread+0x193/0x1a0 It is due to the fact that clocksource_verify_choose_cpus() is invoked with preemption disabled. This function invokes get_random_u32() to obtain random numbers for choosing CPUs. The batched_entropy_32 local lock and/or the base_crng.lock spinlock in driver/char/random.c will be acquired during the call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot be acquired in atomic context. Fix this problem by using migrate_disable() to allow smp_processor_id() to be reliably used without introducing atomic context. preempt_disable() is then called after clocksource_verify_choose_cpus() but before the clocksource measurement is being run to avoid introducing unexpected latency.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21767"
},
{
"cve": "CVE-2025-21795",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NFSD: hang in nfsd4_shutdown_callback. If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21795"
},
{
"cve": "CVE-2025-21796",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21796"
},
{
"cve": "CVE-2025-21848",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfp: bpf: Add check for nfp_app_ctrl_msg_alloc()\r\n\r\nAdd check for the return value of nfp_app_ctrl_msg_alloc() in\r\nnfp_bpf_cmsg_alloc() to prevent null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21848"
},
{
"cve": "CVE-2025-21862",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "drop_monitor: incorrect initialization order. If drop_monitor is built as a kernel module, syzkaller may have time to send a netlink NET_DM_CMD_START message during the module loading. This will call the net_dm_monitor_start() function that uses a spinlock that has not yet been initialized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21862"
},
{
"cve": "CVE-2025-21864",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: drop secpath at the same time as we currently drop dst\r\n\r\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\r\nrunning tests that boil down to:\r\n - create a pair of netns\r\n - run a basic TCP test over ipcomp6\r\n - delete the pair of netns\r\n\r\nThe xfrm_state found on spi_byaddr was not deleted at the time we\r\ndelete the netns, because we still have a reference on it. This\r\nlingering reference comes from a secpath (which holds a ref on the\r\nxfrm_state), which is still attached to an skb. This skb is not\r\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\r\nskb_attempt_defer_free.\r\n\r\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\r\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\r\nthat case, we still have a reference on the xfrm_state that we don\u0027t\r\nexpect at this point.\r\n\r\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\r\nlonger needed, so let\u0027s also drop the secpath. At this point,\r\ntcp_filter has already called into the LSM hooks that may require the\r\nsecpath, so it should not be needed anymore. However, in some of those\r\nplaces, the MPTCP extension has just been attached to the skb, so we\r\ncannot simply drop all extensions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21864"
},
{
"cve": "CVE-2025-21865",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Commit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns dismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl() to destroy devices in each netns as done in geneve and ip tunnels. However, this could trigger -\u003edellink() twice for the same device during -\u003eexit_batch_rtnl().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-21865"
},
{
"cve": "CVE-2025-26465",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-26465"
},
{
"cve": "CVE-2025-31115",
"cwe": {
"id": "CWE-826",
"name": "Premature Release of Resource During Expected Lifetime"
},
"notes": [
{
"category": "summary",
"text": "The threaded .xz decoder in liblzma has a vulnerability that can at least result in a crash (denial of service). The effects include heap use after free and writing to an address based on the null pointer plus an offset.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-31115"
},
{
"cve": "CVE-2025-32988",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-32988"
},
{
"cve": "CVE-2025-32989",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-32989"
},
{
"cve": "CVE-2025-46836",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. `get_name()` in `interface.c` copies interface labels from `/proc/net/dev` into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
],
"title": "CVE-2025-46836"
}
]
}
OPENSUSE-SU-2024:14111-1
Vulnerability from csaf_opensuse - Published: 2024-07-08 00:00 - Updated: 2024-07-08 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "krb5-1.21.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the krb5-1.21.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14111",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14111-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37370 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37371 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37371/"
}
],
"title": "krb5-1.21.3-1.1 on GA media",
"tracking": {
"current_release_date": "2024-07-08T00:00:00Z",
"generator": {
"date": "2024-07-08T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14111-1",
"initial_release_date": "2024-07-08T00:00:00Z",
"revision_history": [
{
"date": "2024-07-08T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-1.21.3-1.1.aarch64",
"product_id": "krb5-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-32bit-1.21.3-1.1.aarch64",
"product_id": "krb5-32bit-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-client-1.21.3-1.1.aarch64",
"product_id": "krb5-client-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-devel-1.21.3-1.1.aarch64",
"product_id": "krb5-devel-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-devel-32bit-1.21.3-1.1.aarch64",
"product_id": "krb5-devel-32bit-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"product_id": "krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"product_id": "krb5-plugin-preauth-otp-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"product_id": "krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"product_id": "krb5-plugin-preauth-spake-1.21.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.21.3-1.1.aarch64",
"product": {
"name": "krb5-server-1.21.3-1.1.aarch64",
"product_id": "krb5-server-1.21.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-1.21.3-1.1.ppc64le",
"product_id": "krb5-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-32bit-1.21.3-1.1.ppc64le",
"product_id": "krb5-32bit-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-client-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-client-1.21.3-1.1.ppc64le",
"product_id": "krb5-client-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-devel-1.21.3-1.1.ppc64le",
"product_id": "krb5-devel-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-devel-32bit-1.21.3-1.1.ppc64le",
"product_id": "krb5-devel-32bit-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"product_id": "krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"product_id": "krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"product_id": "krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"product_id": "krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "krb5-server-1.21.3-1.1.ppc64le",
"product": {
"name": "krb5-server-1.21.3-1.1.ppc64le",
"product_id": "krb5-server-1.21.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.21.3-1.1.s390x",
"product": {
"name": "krb5-1.21.3-1.1.s390x",
"product_id": "krb5-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.21.3-1.1.s390x",
"product": {
"name": "krb5-32bit-1.21.3-1.1.s390x",
"product_id": "krb5-32bit-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-client-1.21.3-1.1.s390x",
"product": {
"name": "krb5-client-1.21.3-1.1.s390x",
"product_id": "krb5-client-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.21.3-1.1.s390x",
"product": {
"name": "krb5-devel-1.21.3-1.1.s390x",
"product_id": "krb5-devel-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.21.3-1.1.s390x",
"product": {
"name": "krb5-devel-32bit-1.21.3-1.1.s390x",
"product_id": "krb5-devel-32bit-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"product": {
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"product_id": "krb5-plugin-kdb-ldap-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"product": {
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"product_id": "krb5-plugin-preauth-otp-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"product_id": "krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"product": {
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"product_id": "krb5-plugin-preauth-spake-1.21.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "krb5-server-1.21.3-1.1.s390x",
"product": {
"name": "krb5-server-1.21.3-1.1.s390x",
"product_id": "krb5-server-1.21.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-1.21.3-1.1.x86_64",
"product_id": "krb5-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-32bit-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-32bit-1.21.3-1.1.x86_64",
"product_id": "krb5-32bit-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-client-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-client-1.21.3-1.1.x86_64",
"product_id": "krb5-client-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-devel-1.21.3-1.1.x86_64",
"product_id": "krb5-devel-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-devel-32bit-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-devel-32bit-1.21.3-1.1.x86_64",
"product_id": "krb5-devel-32bit-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"product_id": "krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"product_id": "krb5-plugin-preauth-otp-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"product_id": "krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"product_id": "krb5-plugin-preauth-spake-1.21.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "krb5-server-1.21.3-1.1.x86_64",
"product": {
"name": "krb5-server-1.21.3-1.1.x86_64",
"product_id": "krb5-server-1.21.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-1.21.3-1.1.s390x"
},
"product_reference": "krb5-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-32bit-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-32bit-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.s390x"
},
"product_reference": "krb5-32bit-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-32bit-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-32bit-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-client-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-client-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-client-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-client-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-client-1.21.3-1.1.s390x"
},
"product_reference": "krb5-client-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-client-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-client-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-client-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-devel-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-devel-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.s390x"
},
"product_reference": "krb5-devel-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-devel-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-32bit-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-devel-32bit-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-32bit-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-devel-32bit-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-32bit-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.s390x"
},
"product_reference": "krb5-devel-32bit-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-32bit-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-devel-32bit-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.s390x"
},
"product_reference": "krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.s390x"
},
"product_reference": "krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-otp-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.s390x"
},
"product_reference": "krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-plugin-preauth-spake-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.21.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-server-1.21.3-1.1.aarch64"
},
"product_reference": "krb5-server-1.21.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.21.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-server-1.21.3-1.1.ppc64le"
},
"product_reference": "krb5-server-1.21.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.21.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-server-1.21.3-1.1.s390x"
},
"product_reference": "krb5-server-1.21.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-1.21.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:krb5-server-1.21.3-1.1.x86_64"
},
"product_reference": "krb5-server-1.21.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37370"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:krb5-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37370",
"url": "https://www.suse.com/security/cve/CVE-2024-37370"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37370",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:krb5-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:krb5-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37371"
}
],
"notes": [
{
"category": "general",
"text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:krb5-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37371",
"url": "https://www.suse.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "SUSE Bug 1227186 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227186"
},
{
"category": "external",
"summary": "SUSE Bug 1227187 for CVE-2024-37371",
"url": "https://bugzilla.suse.com/1227187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:krb5-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:krb5-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-client-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-devel-32bit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.3-1.1.x86_64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.aarch64",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.ppc64le",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.s390x",
"openSUSE Tumbleweed:krb5-server-1.21.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-37371"
}
]
}
GHSA-8WPJ-V5QV-3WF4
Vulnerability from github – Published: 2024-06-29 06:31 – Updated: 2025-11-03 21:31In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
{
"affected": [],
"aliases": [
"CVE-2024-37371"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-06-28T23:15:11Z",
"severity": "CRITICAL"
},
"details": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"id": "GHSA-8wpj-v5qv-3wf4",
"modified": "2025-11-03T21:31:10Z",
"published": "2024-06-29T06:31:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"type": "WEB",
"url": "https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241108-0009"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20250124-0010"
},
{
"type": "WEB",
"url": "https://web.mit.edu/kerberos/www/advisories"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2024-37371
Vulnerability from fkie_nvd - Published: 2024-06-28 23:15 - Updated: 2025-11-03 21:169.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef | Patch | |
| cve@mitre.org | https://web.mit.edu/kerberos/www/advisories/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20241108-0009/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250124-0010/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://web.mit.edu/kerberos/www/advisories/ | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| mit | kerberos_5 | * | |
| debian | debian_linux | 11.0 | |
| debian | debian_linux | 12.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9882067B-E1AC-4800-AB8E-541B937B498A",
"versionEndExcluding": "1.21.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields."
},
{
"lang": "es",
"value": "En MIT Kerberos 5 (tambi\u00e9n conocido como krb5) anterior a 1.21.3, un atacante puede provocar lecturas de memoria no v\u00e1lidas durante el manejo de tokens de mensajes GSS al enviar tokens de mensajes con campos de longitud no v\u00e1lidos."
}
],
"id": "CVE-2024-37371",
"lastModified": "2025-11-03T21:16:13.997",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-06-28T23:15:11.603",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://web.mit.edu/kerberos/www/advisories/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20241108-0009/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20250124-0010/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://web.mit.edu/kerberos/www/advisories/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
MSRC_CVE-2024-37371
Vulnerability from csaf_microsoft - Published: 2024-06-02 07:00 - Updated: 2024-09-11 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3 an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-37371.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "In MIT Kerberos 5 (aka krb5) before 1.21.3 an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
"tracking": {
"current_release_date": "2024-09-11T00:00:00.000Z",
"generator": {
"date": "2025-12-07T13:41:10.648Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-37371",
"initial_release_date": "2024-06-02T07:00:00.000Z",
"revision_history": [
{
"date": "2024-08-05T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-08-16T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-08-17T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-18T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-08-19T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-08-20T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-08-21T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-08-22T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-08-23T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-08-24T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-08-25T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-08-26T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.2",
"number": "13",
"summary": "Information published."
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 krb5 1.21.3-1",
"product": {
"name": "\u003cazl3 krb5 1.21.3-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 krb5 1.21.3-1",
"product": {
"name": "azl3 krb5 1.21.3-1",
"product_id": "17703"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 krb5 1.21.2-1",
"product": {
"name": "\u003cazl3 krb5 1.21.2-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 krb5 1.21.2-1",
"product": {
"name": "azl3 krb5 1.21.2-1",
"product_id": "20087"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 krb5 1.19.4-3",
"product": {
"name": "\u003ccbl2 krb5 1.19.4-3",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 krb5 1.19.4-3",
"product": {
"name": "cbl2 krb5 1.19.4-3",
"product_id": "20083"
}
}
],
"category": "product_name",
"name": "krb5"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 krb5 1.21.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 krb5 1.21.3-1 as a component of Azure Linux 3.0",
"product_id": "17703-17084"
},
"product_reference": "17703",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 krb5 1.21.2-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 krb5 1.21.2-1 as a component of Azure Linux 3.0",
"product_id": "20087-17084"
},
"product_reference": "20087",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 krb5 1.19.4-3 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 krb5 1.19.4-3 as a component of CBL Mariner 2.0",
"product_id": "20083-17086"
},
"product_reference": "20083",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17703-17084",
"20087-17084",
"20083-17086"
],
"known_affected": [
"17084-3",
"17084-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3 an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-37371.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-05T00:00:00.000Z",
"details": "1.21.3-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-1",
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"17084-3",
"17084-1",
"17086-2"
]
}
],
"title": "In MIT Kerberos 5 (aka krb5) before 1.21.3 an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields."
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.